36 research outputs found

    Improving the Reliability of Optimised Link State Routing Protocol in Smart Grid’s Neighbour Area Network

    Get PDF
    A reliable and resilient communication infrastructure that can cope with variable application traffic types and delay objectives is one of the prerequisites that differentiates a Smart Grid from the conventional electrical grid. However, the legacy communication infrastructure in the existing electrical grid is insufficient, if not incapable of satisfying the diverse communication requirements of the Smart Grid. The IEEE 802.11 ad hoc Wireless Mesh Network (WMN) is re-emerging as one of the communication networks that can significantly extend the reach of Smart Grid to backend devices through the Advanced Metering Infrastructure (AMI). However, the unique characteristics of AMI application traffic in the Smart Grid poses some interesting challenges to conventional communication networks including the ad hoc WMN. Hence, there is a need to modify the conventional ad hoc WMN, to address the uncertainties that may exist in its applicability in a Smart Grid environment. This research carries out an in-depth study of the communication of Smart Grid application traffic types over ad hoc WMN deployed in the Neighbour Area Network (NAN). It begins by conducting a critical review of the application characteristics and traffic requirements of several Smart Grid applications and highlighting some key challenges. Based on the reviews, and assuming that the application traffic types use the internet protocol (IP) as a transport protocol, a number of Smart Grid application traffic profiles were developed. Through experimental and simulation studies, a performance evaluation of an ad hoc WMN using the Optimised Link State Routing (OLSR) routing protocol was carried out. This highlighted some capacity and reliability issues that routing AMI application traffic may face within a conventional ad hoc WMN in a Smart Grid NAN. Given the fact that conventional routing solutions do not consider the traffic requirements when making routing decisions, another key observation is the inability of link metrics in routing protocols to select good quality links across multiple hops to a destination and also provide Quality of Service (QoS) support for target application traffic. As with most routing protocols, OLSR protocol uses a single routing metric acquired at the network layer, which may not be able to accommodate different QoS requirements for application traffic in Smart Grid. To address these problems, a novel multiple link metrics approach to improve the reliability performance of routing in ad hoc WMN when deployed for Smart Grid is presented. It is based on the OLSR protocol and explores the possibility of applying QoS routing for application traffic types in NAN based ad hoc WMN. Though routing in multiple metrics has been identified as a complex problem, Multi-Criteria Decision Making (MCDM) techniques such as the Analytical Hierarchy Process (AHP) and pruning have been used to perform such routing on wired and wireless multimedia applications. The proposed multiple metrics OLSR with AHP is used to offer the best available route, based on a number of considered metric parameters. To accommodate the variable application traffic requirements, a study that allows application traffic to use the most appropriate routing metric is presented. The multiple metrics development is then evaluated in Network Simulator 2.34; the simulation results demonstrate that it outperforms existing routing methods that are based on single metrics in OLSR. It also shows that it can be used to improve the reliability of application traffic types, thereby overcoming some weaknesses of existing single metric routing across multiple hops in NAN. The IEEE 802.11g was used to compare and analyse the performance of OLSR and the IEEE 802.11b was used to implement the multiple metrics framework which demonstrate a better performance than the single metric. However, the multiple metrics can also be applied for routing on different IEEE wireless standards, as well as other communication technologies such as Power Line Communication (PLC) when deployed in Smart Grid NAN

    Implementation of Middleware for Internet of Things in Asset Tracking Applications: In-lining Approach

    Get PDF
    ThesisInternet of Things (IoT) is a concept that involves giving objects a digital identity and limited artificial intelligence, which helps the objects to be interactive, process data, make decisions, communicate and react to events virtually with minimum human intervention. IoT is intensified by advancements in hardware and software engineering and promises to close the gap that exists between the physical and digital worlds. IoT is paving ways to address complex phenomena, through designing and implementation of intelligent systems that can monitor phenomena, perform real-time data interpretation, react to events, and swiftly communicate observations. The primary goal of IoT is ubiquitous computing using wireless sensors and communication protocols such as Bluetooth, Wireless Fidelity (Wi-Fi), ZigBee and General Packet Radio Service (GPRS). Insecurity, of assets and lives, is a problem around the world. One application area of IoT is tracking and monitoring; it could therefore be used to solve asset insecurity. A preliminary investigation revealed that security systems in place at Central University of Technology, Free State (CUT) are disjointed; they do not instantaneously and intelligently conscientize security personnel about security breaches using real time messages. As a result, many assets have been stolen, particularly laptops. The main objective of this research was to prove that a real-life application built over a generic IoT architecture that innovatively and intelligently integrates: (1) wireless sensors; (2) radio frequency identification (RFID) tags and readers; (3) fingerprint readers; and (4) mobile phones, can be used to dispel laptop theft. To achieve this, the researcher developed a system, using the heterogeneous devices mentioned above and a middleware that harnessed their unique capabilities to bring out the full potential of IoT in intelligently curbing laptop theft. The resulting system has the ability to: (1) monitor the presence of a laptop using RFID reader that pro-actively interrogates a passive tag attached to the laptop; (2) detect unauthorized removal of a laptop under monitoring; (3) instantly communicate security violations via cell phones; and (4) use Windows location sensors to track the position of a laptop using Googlemaps. The system also manages administrative tasks such as laptop registration, assignment and withdrawal which used to be handled manually. Experiments conducted using the resulting system prototype proved the hypothesis outlined for this research

    RFID: Prospects for Europe: Item-level Tagging and Public Transportation

    Get PDF
    This report, which is part of the COMPLETE series of studies, investigates the current and future competitiveness of the European industry in RFID applications in general and in two specific cases: item-level tagging and public transportation. It analyses its constituent technologies, drivers and barriers to growth, actual and potential markets and economic impacts, the industrial position and innovative capabilities, and it concludes with policy implicationsJRC.DDG.J.4-Information Societ

    An Integration Avenue of Ground Monitoring Based on Wireless Sensor Networks

    Get PDF
    Since wireless sensor networks (WSNs) have a lot of potential capability to provide diverse services to human by monitoring things scattered in real world, they are envisioned as one of the core enabling technologies for ubiquitous computing which organizes and mediates both physical and social interactions anytime and anywhere. WSNs are being adopted in various fields and things in their zones are being monitored. However, existing WSNs are normally designed for observing special zones or regional things based on small-scale, low power, and short range technologies. Seamless system integration at a global scale is still in its infancy stage due to the lack of the fundamental integration technologies. In this paper, we present a global integration avenue of ground monitoring based on WSNs. The proposed avenue includes design, integration, and operational strategies of IP-WSN based territorial monitoring system to ensure compatibility, interoperability, and real-time. Specifically, we offer the standardization of sensing data formats using IP-WSN and database interfaces using EPC sensor network, which enable a spontaneous and systematic integration among the legacy WSN systems. Also, we categorize network topology according to topographic characteristics thereby helping deploy sensor nodes on the real environment. Therefore, the proposed technology would be a milestone for the practically deployable global territorial monitoring systems

    Internet of Things Applications - From Research and Innovation to Market Deployment

    Get PDF
    The book aims to provide a broad overview of various topics of Internet of Things from the research, innovation and development priorities to enabling technologies, nanoelectronics, cyber physical systems, architecture, interoperability and industrial applications. It is intended to be a standalone book in a series that covers the Internet of Things activities of the IERC – Internet of Things European Research Cluster from technology to international cooperation and the global "state of play".The book builds on the ideas put forward by the European research Cluster on the Internet of Things Strategic Research Agenda and presents global views and state of the art results on the challenges facing the research, development and deployment of IoT at the global level. Internet of Things is creating a revolutionary new paradigm, with opportunities in every industry from Health Care, Pharmaceuticals, Food and Beverage, Agriculture, Computer, Electronics Telecommunications, Automotive, Aeronautics, Transportation Energy and Retail to apply the massive potential of the IoT to achieving real-world solutions. The beneficiaries will include as well semiconductor companies, device and product companies, infrastructure software companies, application software companies, consulting companies, telecommunication and cloud service providers. IoT will create new revenues annually for these stakeholders, and potentially create substantial market share shakeups due to increased technology competition. The IoT will fuel technology innovation by creating the means for machines to communicate many different types of information with one another while contributing in the increased value of information created by the number of interconnections among things and the transformation of the processed information into knowledge shared into the Internet of Everything. The success of IoT depends strongly on enabling technology development, market acceptance and standardization, which provides interoperability, compatibility, reliability, and effective operations on a global scale. The connected devices are part of ecosystems connecting people, processes, data, and things which are communicating in the cloud using the increased storage and computing power and pushing for standardization of communication and metadata. In this context security, privacy, safety, trust have to be address by the product manufacturers through the life cycle of their products from design to the support processes. The IoT developments address the whole IoT spectrum - from devices at the edge to cloud and datacentres on the backend and everything in between, through ecosystems are created by industry, research and application stakeholders that enable real-world use cases to accelerate the Internet of Things and establish open interoperability standards and common architectures for IoT solutions. Enabling technologies such as nanoelectronics, sensors/actuators, cyber-physical systems, intelligent device management, smart gateways, telematics, smart network infrastructure, cloud computing and software technologies will create new products, new services, new interfaces by creating smart environments and smart spaces with applications ranging from Smart Cities, smart transport, buildings, energy, grid, to smart health and life. Technical topics discussed in the book include: • Introduction• Internet of Things Strategic Research and Innovation Agenda• Internet of Things in the industrial context: Time for deployment.• Integration of heterogeneous smart objects, applications and services• Evolution from device to semantic and business interoperability• Software define and virtualization of network resources• Innovation through interoperability and standardisation when everything is connected anytime at anyplace• Dynamic context-aware scalable and trust-based IoT Security, Privacy framework• Federated Cloud service management and the Internet of Things• Internet of Things Application

    Sensor Networks and Their Applications: Investigating the Role of Sensor Web Enablement

    Get PDF
    The Engineering Doctorate (EngD) was conducted in conjunction with BT Research on state-of-the-art Wireless Sensor Network (WSN) projects. The first area of work is a literature review of WSN project applications, some of which the author worked on as a BT Researcher based at the world renowned Adastral Park Research Labs in Suffolk (2004-09). WSN applications are examined within the context of Machine-to-Machine (M2M); Information Networking (IN); Internet/Web of Things (IoT/WoT); smart home and smart devices; BT’s 21st Century Network (21CN); Cloud Computing; and future trends. In addition, this thesis provides an insight into the capabilities of similar external WSN project applications. Under BT’s Sensor Virtualization project, the second area of work focuses on building a Generic Architecture for WSNs with reusable infrastructure and ‘infostructure’ by identifying and trialling suitable components, in order to realise actual business benefits for BT. The third area of work focuses on the Open Geospatial Consortium (OGC) standards and their Sensor Web Enablement (SWE) initiative. The SWE framework was investigated to ascertain its potential as a component of the Generic Architecture. BT’s SAPHE project served as a use case. BT Research’s experiences of taking this traditional (vertical) stove-piped application and creating SWE compliant services are described. The author’s findings were originally presented in a series of publications and have been incorporated into this thesis along with supplementary WSN material from BT Research projects. SWE 2.0 specifications are outlined to highlight key improvements, since work began at BT with SWE 1.0. The fourth area of work focuses on Complex Event Processing (CEP) which was evaluated to ascertain its potential for aggregating and correlating the shared project sensor data (‘infostructure’) harvested and for enabling data fusion for WSNs in diverse domains. Finally, the conclusions and suggestions for further work are provided

    Segurança e privacidade em terminologia de rede

    Get PDF
    Security and Privacy are now at the forefront of modern concerns, and drive a significant part of the debate on digital society. One particular aspect that holds significant bearing in these two topics is the naming of resources in the network, because it directly impacts how networks work, but also affects how security mechanisms are implemented and what are the privacy implications of metadata disclosure. This issue is further exacerbated by interoperability mechanisms that imply this information is increasingly available regardless of the intended scope. This work focuses on the implications of naming with regards to security and privacy in namespaces used in network protocols. In particular on the imple- mentation of solutions that provide additional security through naming policies or increase privacy. To achieve this, different techniques are used to either embed security information in existing namespaces or to minimise privacy ex- posure. The former allows bootstraping secure transport protocols on top of insecure discovery protocols, while the later introduces privacy policies as part of name assignment and resolution. The main vehicle for implementation of these solutions are general purpose protocols and services, however there is a strong parallel with ongoing re- search topics that leverage name resolution systems for interoperability such as the Internet of Things (IoT) and Information Centric Networks (ICN), where these approaches are also applicable.Segurança e Privacidade são dois topicos que marcam a agenda na discus- são sobre a sociedade digital. Um aspecto particularmente subtil nesta dis- cussão é a forma como atribuímos nomes a recursos na rede, uma escolha com consequências práticas no funcionamento dos diferentes protocols de rede, na forma como se implementam diferentes mecanismos de segurança e na privacidade das várias partes envolvidas. Este problema torna-se ainda mais significativo quando se considera que, para promover a interoperabili- dade entre diferentes redes, mecanismos autónomos tornam esta informação acessível em contextos que vão para lá do que era pretendido. Esta tese foca-se nas consequências de diferentes políticas de atribuição de nomes no contexto de diferentes protocols de rede, para efeitos de segurança e privacidade. Com base no estudo deste problema, são propostas soluções que, através de diferentes políticas de atribuição de nomes, permitem introdu- zir mecanismos de segurança adicionais ou mitigar problemas de privacidade em diferentes protocolos. Isto resulta na implementação de mecanismos de segurança sobre protocolos de descoberta inseguros, assim como na intro- dução de mecanismos de atribuiçao e resolução de nomes que se focam na protecçao da privacidade. O principal veículo para a implementação destas soluções é através de ser- viços e protocolos de rede de uso geral. No entanto, a aplicabilidade destas soluções extende-se também a outros tópicos de investigação que recorrem a mecanismos de resolução de nomes para implementar soluções de intero- perabilidade, nomedamente a Internet das Coisas (IoT) e redes centradas na informação (ICN).Programa Doutoral em Informátic

    Acta Universitatis Sapientiae - Electrical and Mechanical Engineering

    Get PDF
    Series Electrical and Mechanical Engineering publishes original papers and surveys in various fields of Electrical and Mechanical Engineering

    Information and Communication Technologies for Integrated Operations of Ships

    Get PDF
    Over the past three decades, information and communication technologies have filled our daily life with great comfort and convenience. As the technology keeps evolving, user expectations for more challenging cases that can benefit from advanced information and communication technologies are increasing, e.g., the scenario of Integrated Operations (IO) for ships in the maritime domain. However, to realize integrated operations for ships is a complex task that involves addressing problems such as interoperability among heterogeneous operation applications and connectivity within harsh maritime communication environments. The common approach was to tackle these challenges separately by service integration and communication integration, respectively: each utilizes optimized and independent implementations. Separate solutions work fine within their own contexts, whereas conflicts and inconsistencies can be identified by integrating them together for specific maritime scenarios. Therefore, connection between separate solutions needs to be studied. In this dissertation, we first take a look at complex systems to obtain useful methodologies applied to integrated operations for ships. Then we study IO of ships from different perspectives and divide the complex task into sub-tasks. We explore separate approaches to these sub-tasks, examine the connection in between, resolve inconsistencies if there are any, and continue the exploration process till a compatible and integrated solution can be accomplished. In general, this journey represents our argument for an integration-oriented complex system development approach. In concrete, it shows the way on how to achieve IO of ships by both providing connectivity in harsh communication environments and allowing interoperability among heterogeneous operation applications, and most importantly by ensuring the synergy in between. This synergy also gives hints on the evolution towards a next generation network architecture for the future Internet
    corecore