36 research outputs found
Improving the Reliability of Optimised Link State Routing Protocol in Smart Grid’s Neighbour Area Network
A reliable and resilient communication infrastructure that can cope with variable application traffic types and delay objectives is one of the prerequisites that differentiates a Smart Grid from the conventional electrical grid. However, the legacy communication infrastructure in the existing electrical grid is insufficient, if not incapable of satisfying the diverse communication requirements of the Smart Grid. The IEEE 802.11 ad hoc Wireless Mesh Network (WMN) is re-emerging as one of the communication networks that can significantly extend the reach of Smart Grid to backend devices through the Advanced Metering Infrastructure (AMI). However, the unique characteristics of AMI application traffic in the Smart Grid poses some interesting challenges to conventional communication networks including the ad hoc WMN. Hence, there is a need to modify the conventional ad hoc WMN, to address the uncertainties that may exist in its applicability in a Smart Grid environment. This research carries out an in-depth study of the communication of Smart Grid application traffic types over ad hoc WMN deployed in the Neighbour Area Network (NAN). It begins by conducting a critical review of the application characteristics and traffic requirements of several Smart Grid applications and highlighting some key challenges. Based on the reviews, and assuming that the application traffic types use the internet protocol (IP) as a transport protocol, a number of Smart Grid application traffic profiles were developed. Through experimental and simulation studies, a performance evaluation of an ad hoc WMN using the Optimised Link State Routing (OLSR) routing protocol was carried out. This highlighted some capacity and reliability issues that routing AMI application traffic may face within a conventional ad hoc WMN in a Smart Grid NAN. Given the fact that conventional routing solutions do not consider the traffic requirements when making routing decisions, another key observation is the inability of link metrics in routing protocols to select good quality links across multiple hops to a destination and also provide Quality of Service (QoS) support for target application traffic. As with most routing protocols, OLSR protocol uses a single routing metric acquired at the network layer, which may not be able to accommodate different QoS requirements for application traffic in Smart Grid. To address these problems, a novel multiple link metrics approach to improve the reliability performance of routing in ad hoc WMN when deployed for Smart Grid is presented. It is based on the OLSR protocol and explores the possibility of applying QoS routing for application traffic types in NAN based ad hoc WMN. Though routing in multiple metrics has been identified as a complex problem, Multi-Criteria Decision Making (MCDM) techniques such as the Analytical Hierarchy Process (AHP) and pruning have been used to perform such routing on wired and wireless multimedia applications. The proposed multiple metrics OLSR with AHP is used to offer the best available route, based on a number of considered metric parameters. To accommodate the variable application traffic requirements, a study that allows application traffic to use the most appropriate routing metric is presented. The multiple metrics development is then evaluated in Network Simulator 2.34; the simulation results demonstrate that it outperforms existing routing methods that are based on single metrics in OLSR. It also shows that it can be used to improve the reliability of application traffic types, thereby overcoming some weaknesses of existing single metric routing across multiple hops in NAN. The IEEE 802.11g was used to compare and analyse the performance of OLSR and the IEEE 802.11b was used to implement the multiple metrics framework which demonstrate a better performance than the single metric. However, the multiple metrics can also be applied for routing on different IEEE wireless standards, as well as other communication technologies such as Power Line Communication (PLC) when deployed in Smart Grid NAN
Implementation of Middleware for Internet of Things in Asset Tracking Applications: In-lining Approach
ThesisInternet of Things (IoT) is a concept that involves giving objects a digital identity and limited
artificial intelligence, which helps the objects to be interactive, process data, make decisions,
communicate and react to events virtually with minimum human intervention. IoT is intensified
by advancements in hardware and software engineering and promises to close the gap that exists
between the physical and digital worlds. IoT is paving ways to address complex phenomena,
through designing and implementation of intelligent systems that can monitor phenomena,
perform real-time data interpretation, react to events, and swiftly communicate observations. The
primary goal of IoT is ubiquitous computing using wireless sensors and communication
protocols such as Bluetooth, Wireless Fidelity (Wi-Fi), ZigBee and General Packet Radio
Service (GPRS).
Insecurity, of assets and lives, is a problem around the world. One application area of IoT is
tracking and monitoring; it could therefore be used to solve asset insecurity. A preliminary
investigation revealed that security systems in place at Central University of Technology, Free
State (CUT) are disjointed; they do not instantaneously and intelligently conscientize security
personnel about security breaches using real time messages. As a result, many assets have been
stolen, particularly laptops. The main objective of this research was to prove that a real-life application built over a generic
IoT architecture that innovatively and intelligently integrates: (1) wireless sensors; (2) radio
frequency identification (RFID) tags and readers; (3) fingerprint readers; and (4) mobile phones,
can be used to dispel laptop theft. To achieve this, the researcher developed a system, using the
heterogeneous devices mentioned above and a middleware that harnessed their unique
capabilities to bring out the full potential of IoT in intelligently curbing laptop theft.
The resulting system has the ability to: (1) monitor the presence of a laptop using RFID reader
that pro-actively interrogates a passive tag attached to the laptop; (2) detect unauthorized
removal of a laptop under monitoring; (3) instantly communicate security violations via cell
phones; and (4) use Windows location sensors to track the position of a laptop using Googlemaps.
The system also manages administrative tasks such as laptop registration, assignment and withdrawal which used to be handled manually. Experiments conducted using the resulting
system prototype proved the hypothesis outlined for this research
Recommended from our members
Middleware architectures for the smart grid: A survey on the state-of-the-art, taxonomy and main open issues
The integration of small-scale renewable energy sources in the smart grid depends on several challenges that must be overcome. One of them is the presence of devices with very different characteristics present in the grid or how they can interact among them in terms of interoperability and data sharing. While this issue is usually solved by implementing a middleware layer among the available pieces of equipment in order to hide any hardware heterogeneity and offer the application layer a collection of homogenous resources to access lower levels, the variety and differences among them make the definition of what is needed in each particular case challenging. This paper offers a description of the most prominent middleware architectures for the smart grid and assesses the functionalities they have, considering the performance and features expected from them in the context of this application domain
RFID: Prospects for Europe: Item-level Tagging and Public Transportation
This report, which is part of the COMPLETE series of studies, investigates the current and future competitiveness of the European industry in RFID applications in general and in two specific cases: item-level tagging and public transportation. It analyses its constituent technologies, drivers and barriers to growth, actual and potential markets and economic impacts, the industrial position and innovative capabilities, and it concludes with policy implicationsJRC.DDG.J.4-Information Societ
An Integration Avenue of Ground Monitoring Based on Wireless Sensor Networks
Since wireless sensor networks (WSNs) have a lot of potential capability to provide diverse services to human by monitoring things scattered in real world, they are envisioned as one of the core enabling technologies for ubiquitous computing which organizes and mediates both physical and social interactions anytime and anywhere. WSNs are being adopted in various fields and things in their zones are being monitored. However, existing WSNs are normally designed for observing special zones or regional things based on small-scale, low power, and short range technologies. Seamless system integration at a global scale is still in its infancy stage due to the lack of the fundamental integration technologies. In this paper, we present a global integration avenue of ground monitoring based on WSNs. The proposed avenue includes design, integration, and operational strategies of IP-WSN based territorial monitoring system to ensure compatibility, interoperability, and real-time. Specifically, we offer the standardization of sensing data formats using IP-WSN and database interfaces using EPC sensor network, which enable a spontaneous and systematic integration among the legacy WSN systems. Also, we categorize network topology according to topographic characteristics thereby helping deploy sensor nodes on the real environment. Therefore, the proposed technology would be a milestone for the practically deployable global territorial monitoring systems
Internet of Things Applications - From Research and Innovation to Market Deployment
The book aims to provide a broad overview of various topics of Internet of Things from the research, innovation and development priorities to enabling technologies, nanoelectronics, cyber physical systems, architecture, interoperability and industrial applications. It is intended to be a standalone book in a series that covers the Internet of Things activities of the IERC – Internet of Things European Research Cluster from technology to international cooperation and the global "state of play".The book builds on the ideas put forward by the European research Cluster on the Internet of Things Strategic Research Agenda and presents global views and state of the art results on the challenges facing the research, development and deployment of IoT at the global level. Internet of Things is creating a revolutionary new paradigm, with opportunities in every industry from Health Care, Pharmaceuticals, Food and Beverage, Agriculture, Computer, Electronics Telecommunications, Automotive, Aeronautics, Transportation Energy and Retail to apply the massive potential of the IoT to achieving real-world solutions. The beneficiaries will include as well semiconductor companies, device and product companies, infrastructure software companies, application software companies, consulting companies, telecommunication and cloud service providers. IoT will create new revenues annually for these stakeholders, and potentially create substantial market share shakeups due to increased technology competition. The IoT will fuel technology innovation by creating the means for machines to communicate many different types of information with one another while contributing in the increased value of information created by the number of interconnections among things and the transformation of the processed information into knowledge shared into the Internet of Everything. The success of IoT depends strongly on enabling technology development, market acceptance and standardization, which provides interoperability, compatibility, reliability, and effective operations on a global scale. The connected devices are part of ecosystems connecting people, processes, data, and things which are communicating in the cloud using the increased storage and computing power and pushing for standardization of communication and metadata. In this context security, privacy, safety, trust have to be address by the product manufacturers through the life cycle of their products from design to the support processes. The IoT developments address the whole IoT spectrum - from devices at the edge to cloud and datacentres on the backend and everything in between, through ecosystems are created by industry, research and application stakeholders that enable real-world use cases to accelerate the Internet of Things and establish open interoperability standards and common architectures for IoT solutions. Enabling technologies such as nanoelectronics, sensors/actuators, cyber-physical systems, intelligent device management, smart gateways, telematics, smart network infrastructure, cloud computing and software technologies will create new products, new services, new interfaces by creating smart environments and smart spaces with applications ranging from Smart Cities, smart transport, buildings, energy, grid, to smart health and life. Technical topics discussed in the book include: • Introduction• Internet of Things Strategic Research and Innovation Agenda• Internet of Things in the industrial context: Time for deployment.• Integration of heterogeneous smart objects, applications and services• Evolution from device to semantic and business interoperability• Software define and virtualization of network resources• Innovation through interoperability and standardisation when everything is connected anytime at anyplace• Dynamic context-aware scalable and trust-based IoT Security, Privacy framework• Federated Cloud service management and the Internet of Things• Internet of Things Application
Sensor Networks and Their Applications: Investigating the Role of Sensor Web Enablement
The Engineering Doctorate (EngD) was conducted in conjunction with BT Research on state-of-the-art Wireless Sensor Network (WSN) projects. The first area of work is a literature review of WSN project applications, some of which the author worked on as a BT Researcher based at the world renowned Adastral Park Research Labs in Suffolk (2004-09). WSN applications are examined within the context of Machine-to-Machine (M2M); Information Networking (IN); Internet/Web of Things (IoT/WoT); smart home and smart devices; BT’s 21st Century Network (21CN); Cloud Computing; and future trends. In addition, this thesis provides an insight into the capabilities of similar external WSN project applications. Under BT’s Sensor Virtualization project, the second area of work focuses on building a Generic Architecture for WSNs with reusable infrastructure and ‘infostructure’ by identifying and trialling suitable components, in order to realise actual business benefits for BT. The third area of work focuses on the Open Geospatial Consortium (OGC) standards and their Sensor Web Enablement (SWE) initiative. The SWE framework was investigated to ascertain its potential as a component of the Generic Architecture. BT’s SAPHE project served as a use case. BT Research’s experiences of taking this traditional (vertical) stove-piped application and creating SWE compliant services are described. The author’s findings were originally presented in a series of publications and have been incorporated into this thesis along with supplementary WSN material from BT Research projects. SWE 2.0 specifications are outlined to highlight key improvements, since work began at BT with SWE 1.0. The fourth area of work focuses on Complex Event Processing (CEP) which was evaluated to ascertain its potential for aggregating and correlating the shared project sensor data (‘infostructure’) harvested and for enabling data fusion for WSNs in diverse domains. Finally, the conclusions and suggestions for further work are provided
Segurança e privacidade em terminologia de rede
Security and Privacy are now at the forefront of modern concerns, and drive
a significant part of the debate on digital society. One particular aspect that
holds significant bearing in these two topics is the naming of resources in the
network, because it directly impacts how networks work, but also affects how
security mechanisms are implemented and what are the privacy implications
of metadata disclosure. This issue is further exacerbated by interoperability
mechanisms that imply this information is increasingly available regardless of
the intended scope.
This work focuses on the implications of naming with regards to security and
privacy in namespaces used in network protocols. In particular on the imple-
mentation of solutions that provide additional security through naming policies
or increase privacy. To achieve this, different techniques are used to either
embed security information in existing namespaces or to minimise privacy ex-
posure. The former allows bootstraping secure transport protocols on top of
insecure discovery protocols, while the later introduces privacy policies as part
of name assignment and resolution.
The main vehicle for implementation of these solutions are general purpose
protocols and services, however there is a strong parallel with ongoing re-
search topics that leverage name resolution systems for interoperability such
as the Internet of Things (IoT) and Information Centric Networks (ICN), where
these approaches are also applicable.Segurança e Privacidade são dois topicos que marcam a agenda na discus-
são sobre a sociedade digital. Um aspecto particularmente subtil nesta dis-
cussão é a forma como atribuÃmos nomes a recursos na rede, uma escolha
com consequências práticas no funcionamento dos diferentes protocols de
rede, na forma como se implementam diferentes mecanismos de segurança
e na privacidade das várias partes envolvidas. Este problema torna-se ainda
mais significativo quando se considera que, para promover a interoperabili-
dade entre diferentes redes, mecanismos autónomos tornam esta informação
acessÃvel em contextos que vão para lá do que era pretendido.
Esta tese foca-se nas consequências de diferentes polÃticas de atribuição de
nomes no contexto de diferentes protocols de rede, para efeitos de segurança
e privacidade. Com base no estudo deste problema, são propostas soluções
que, através de diferentes polÃticas de atribuição de nomes, permitem introdu-
zir mecanismos de segurança adicionais ou mitigar problemas de privacidade
em diferentes protocolos. Isto resulta na implementação de mecanismos de
segurança sobre protocolos de descoberta inseguros, assim como na intro-
dução de mecanismos de atribuiçao e resolução de nomes que se focam na
protecçao da privacidade.
O principal veÃculo para a implementação destas soluções é através de ser-
viços e protocolos de rede de uso geral. No entanto, a aplicabilidade destas
soluções extende-se também a outros tópicos de investigação que recorrem
a mecanismos de resolução de nomes para implementar soluções de intero-
perabilidade, nomedamente a Internet das Coisas (IoT) e redes centradas na
informação (ICN).Programa Doutoral em Informátic
Acta Universitatis Sapientiae - Electrical and Mechanical Engineering
Series Electrical and Mechanical Engineering publishes original papers and surveys in various fields of Electrical and Mechanical Engineering
Information and Communication Technologies for Integrated Operations of Ships
Over the past three decades, information and communication technologies have
filled our daily life with great comfort and convenience. As the technology keeps
evolving, user expectations for more challenging cases that can benefit from advanced
information and communication technologies are increasing, e.g., the scenario
of Integrated Operations (IO) for ships in the maritime domain.
However, to realize integrated operations for ships is a complex task that involves
addressing problems such as interoperability among heterogeneous operation
applications and connectivity within harsh maritime communication environments.
The common approach was to tackle these challenges separately by service
integration and communication integration, respectively: each utilizes optimized
and independent implementations. Separate solutions work fine within their own
contexts, whereas conflicts and inconsistencies can be identified by integrating them
together for specific maritime scenarios. Therefore, connection between separate
solutions needs to be studied.
In this dissertation, we first take a look at complex systems to obtain useful
methodologies applied to integrated operations for ships. Then we study IO of
ships from different perspectives and divide the complex task into sub-tasks. We
explore separate approaches to these sub-tasks, examine the connection in between,
resolve inconsistencies if there are any, and continue the exploration process till a
compatible and integrated solution can be accomplished. In general, this journey
represents our argument for an integration-oriented complex system development
approach. In concrete, it shows the way on how to achieve IO of ships by both
providing connectivity in harsh communication environments and allowing interoperability
among heterogeneous operation applications, and most importantly by
ensuring the synergy in between. This synergy also gives hints on the evolution
towards a next generation network architecture for the future Internet