11 research outputs found

    FF-DBF-WIN: On the Forced-Forward Demand-Bound Function Analysis for Wireless Industrial Networks

    Get PDF
    Wireless Industrial Networks (WINs) have brought to the forefront the need for real-time strategies to ensure network schedulability. The Demand Bound Function (DBF) has recently been borrowed from the multicore scheduling theory and adapted to the wireless industrial domain to compute the network demand. However, a more precise estimation can be obtained by using alternative supply/demand analyses. This paper proposes the forced-forward demand bound function to estimate the network demand and better determine the schedulability of WINs.info:eu-repo/semantics/publishedVersio

    Dynamic power allocation and scheduling for MIMO RF energy harvesting wireless sensor platforms

    Get PDF
    Radio frequency (RF) energy harvesting systems are enabling new evolution towards charging low energy wireless devices, especially wireless sensor networks (WSN). This evolution is sparked by the development of low-energy micro-controller units (MCU). This article presents a practical multiple input multiple output (MIMO) RF energy-harvesting platform for WSN. The RF energy is sourced from a dedicated access point (AP). The sensor node is equipped with multiple antennas with diverse frequency responses. Moreover, the platform allows for simultaneous information and energy transfer without sacrificing system duplexity, unlike time-switching RF harvesting systems where data is transmitted only for a portion of the total transmission duty cycle, or power-splitting systems where the power difference between the information signal (IS) and energy signal (ES) is neglected. The proposed platform addresses the gap between those two. Furthermore, system simulation and two energy scheduling methods between AP and sensor node (SN) are presented, namely, Continuous power stream (CPS) and intermittent power stream (IPS)

    iSensA - A System for Collecting and Integrating Sensor Data

    Get PDF
    The idea of monitoring several types of parameters in various environments has been motivating significant research works in Internet of Things (IoT). This paper presents the design and construction of iSensA, a system for integrating and collecting information from sensors. The solution implements a multi-sensor monitoring system and then expands the monitoring concept to an IoT solution, by employing multi-network access, Web services, database and web and mobile applications for user interaction. iSensA system is highly configurable, enabling several monitoring solutions with different types of sensors. Experiments have been performed on real application scenarios to validate and evaluate our proposition.info:eu-repo/semantics/acceptedVersio

    On the use of Wireless Sensor Networks in Preventative Maintenance for Industry 4.0

    Get PDF
    The goal of this paper is to present a literature study on the use of Wireless Sensor Networks (WSNs) in Preventative Maintenance applications for Industry 4.0. Requirements for industrial applications are discussed along with a comparative of the characteristics of the existing and emerging WSN technology enablers. The design considerations inherent to WSNs becoming a tool to drive maintenance efficiencies are discussed in the context of implementations in the research literature and commercial solutions available on the market

    Is Link-Layer Anycast Scheduling Relevant for IEEE802.15.4-TSCH Networks?

    Get PDF
    International audienceWith the wide adoption of low-power wireless transmissions , industrial networks have started to incorporate wireless devices in their communication infrastructure. Specifically, IEEE802.15.4-TSCH enables slow channel hopping to increase the robustness, and relies on a strict schedule of the transmissions to increase the energy efficiency. Anycast is a link-layer technique to improve the reliability when using lossy links. Several receivers are associated to a single transmission. That way, a transmission is considered erroneous when none of the receivers was able to decode and acknowledge it. Appropriately exploited by the routing layer, we can also increase the fault-tolerance. However, most of the anycast schemes have been evaluated by simulations, for a sake of simplicity. Besides, most evaluation models assume that packet drops are independent events, which may not be the case for packet drops due to e.g. external interference. Here, we use a large dataset obtained through an indoor testbed to assess the gain of using anycast in real conditions. We also propose a strategy to select the set of forwarding nodes: they must increase the reliability by providing the most independent packet losses. We demonstrate using our experimental dataset that anycast improves really the performance, but only when respecting a set of rules to select the next hops in the routing layer

    TOMAC-WSN: A new WSN efficient protocol for monitoring big distributed mechanical systems

    Get PDF
    International audienceThis paper addresses a wireless sensor network dedicated to monitor a large mechanical system. The chosen system for the scenario is a chairlift. In this case the wireless sensor network special feature is the mobility of nodes following an invariant path traveled repeatedly. A sensor node is put on each chair and a sink node is at ground at the upper end of the chairlift. A new protocol called TOMAC-WSN is designed in order to schedule frames transmission using token concept. This avoids collision at the medium access. The second concept used by TOMAC-WSN is frame aggregation. This new protocol has been modelled using Finite State Automata. An experimental implementation on Arduino boards shows the correct operation of the network. Network performance in terms of delivery time and packet loss rate is evaluated using simulation. The results show that the proposed TOMAC-WSN protocol delivers the appropriate quality of service for the monitoring of large physical systems

    Cybersecurity of Industrial Cyber-Physical Systems: A Review

    Get PDF
    Industrial cyber-physical systems (ICPSs) manage critical infrastructures by controlling the processes based on the "physics" data gathered by edge sensor networks. Recent innovations in ubiquitous computing and communication technologies have prompted the rapid integration of highly interconnected systems to ICPSs. Hence, the "security by obscurity" principle provided by air-gapping is no longer followed. As the interconnectivity in ICPSs increases, so does the attack surface. Industrial vulnerability assessment reports have shown that a variety of new vulnerabilities have occurred due to this transition while the most common ones are related to weak boundary protection. Although there are existing surveys in this context, very little is mentioned regarding these reports. This paper bridges this gap by defining and reviewing ICPSs from a cybersecurity perspective. In particular, multi-dimensional adaptive attack taxonomy is presented and utilized for evaluating real-life ICPS cyber incidents. We also identify the general shortcomings and highlight the points that cause a gap in existing literature while defining future research directions.Comment: 32 pages, 10 figure

    Modelización Matemática de la propagación de malware: Un nuevo enfoque basado en la seguridad de la información

    Get PDF
    [ES] En esta tesis se estudian modelos que simulan la propagación del malware. Uno de los objetivos de estos modelos es prever si una epidemia desaparece o permanece a lo largo del tiempo. Para ello se realiza un estudio de la estabilidad del modelo y se calcula el número reproductivo básico, denotado por R0. Para estudiar la estabilidad se usan los valores propios de las matrices Jacobianas, las funciones de Liapunov y el enfoque geométrico, mientras que para obtener el número reproductivo básico se utiliza el método de la siguiente generación. De este modo, se obtiene que la epidemia desaparece si R0 es menor o igual a 1 y la epidemia se mantiene si R0 > 1, entre otras propiedades. Haciendo un análisis de estos modelos se han propuesto tres mejoras en esta tesis: 1. La creación de una familia de modelos que tiene en cuenta el compartimento de los portadores, es decir, aquellos dispositivos que están infectados pero el malware no les afecta. 2. El estudio del número reproductivo básico en varias variables. 3. La redefinición de los parámetros de los modelos teniendo en cuenta las características del malware
    corecore