334 research outputs found

    Recent advances in industrial wireless sensor networks towards efficient management in IoT

    Get PDF
    With the accelerated development of Internet-of- Things (IoT), wireless sensor networks (WSN) are gaining importance in the continued advancement of information and communication technologies, and have been connected and integrated with Internet in vast industrial applications. However, given the fact that most wireless sensor devices are resource constrained and operate on batteries, the communication overhead and power consumption are therefore important issues for wireless sensor networks design. In order to efficiently manage these wireless sensor devices in a unified manner, the industrial authorities should be able to provide a network infrastructure supporting various WSN applications and services that facilitate the management of sensor-equipped real-world entities. This paper presents an overview of industrial ecosystem, technical architecture, industrial device management standards and our latest research activity in developing a WSN management system. The key approach to enable efficient and reliable management of WSN within such an infrastructure is a cross layer design of lightweight and cloud-based RESTful web service

    An ideal IoT solution for real-time web monitoring

    Get PDF
    For the internet of things (IoT) to fully emerge, it is necessary to design a suitable system architecture and specific protocols for this environment. The former to provide horizontal solutions, breaking away the current paradigm of silos solutions, and thus, allowing the creation of open and interoperable systems; while the latter will offer efficient and scalable communications. This paper presents the latest standards and ongoing efforts to develop specific protocols for IoT. Furthermore, this paper presents a new system, with the most recent standards for IoT. Its design, implementation and evaluation will be also described. The proposed system is based on the latest ETSI M2M specification (ETSI TC M2M in ETSI TS 103 093 V2.1.1.http://www.etsi.org/deliver/etsi_ts/103000_103099/103093/02.01.01_60/ts_103093v020101p.pdf, 2013b) and the MQTT protocol (IBM, Eurotech in MQTT V3.1 Protocol Specification pp 1-42, http://public.dhe.ibm.com/software/dw/webservices/ws-mqtt/MQTT_V3.1_Protocol_Specific. pdf, 2010). With this solution it is possible to show how we can create new applications to run over it and the importance of designing specifically tailored for IoT communication protocols in order to support real-time applications.- This project was funded by Fundo Europeu de Desenvolvimento Regional (FEDER), by Programa Operacional Factores de Competitividade (POFC) - COMPETE and by Fundacao para a Ciencia eTecnologia, on the Scope of projects: PEstC/EEI/UI0319/2015 and PEstC/EEI/UI0027/2015. This paper is a result of the project "SmartEGOV: Harnessing EGOV for Smart Governance (Foundations, methods, Tools) / NORTE-01-0145-FEDER-000037", supported by Norte Portugal Regional Operational Programme(NORTE2020), under the PORTUGAL 2020 Partnership Agreement, through the European Regional Development Fund (EFDR).info:eu-repo/semantics/publishedVersio

    Self-adaptive Device Management for the IoT Using Constraint Solving

    Get PDF
    International audienceIn the context of IoT (Internet of Things), Device Management (DM), i.e., remote administration of IoT devices, becomes essential to keep them connected, updated and secure, thus increasing their lifespan through firmware and configuration updates and security patches. Legacy DM solutions are adequate when dealing with home devices (such as Television set-top boxes) but need to be extended to adapt to new IoT requirements. Indeed, their manual operation by system administrators requires advanced knowledge and skills. Further, the static DM platform-a component above IoT platforms that offers advanced features such as campaign updates / massive operation management-is unable to scale and adapt to IoT dynamicity. To cope with this, this work, performed in an industrial context at Orange, proposes a self-adaptive architecture with runtime horizontal scaling of DM servers, with an autonomic Auto-Scaling Manager, integrating in the loop constraint programming for decisionmaking, validated with a meaningful industrial use-case

    Experimental design for a next generation residential gateway

    Get PDF
    Puolella eurooppalaisista kotitalouksista on laajakaistaliittymä. Yleensä käyttäjä kytkeytyy ulkoiseen verkkoon kotireitittimen avulla (residential gateway). Internet-yhteyden ja IP-perustaisten palveluiden kuten VoIP- ja IPTV-palveluiden lisäksi kotireititin muodostaa kotiverkon ytimen kodin verkkolaitteiden liittyessä siihen. Kotiverkkojen lukumäärän ja koon kasvun seurauksena kotiverkoissa voidaan tunnistaa kolme ongelmaa. Ensinnäkin kotiverkkojen hallinta on haastavaa kotiverkossa tuettavien verkkotekniikoiden ja laitteiden määrän kasvaessa. Toiseksi sisällönhallinta. on monimutkaistunut käyttäjien luodessa ja kuluttaessa yhä enemmän sisältöä. Kolmanneksi uudet verkkoperustaiset tekniikat kuten sähköisen terveydenhuollon ratkaisut (e-health) integroituvat usein heikosti olemassa olevien kotiverkkolaitteiden kanssa. Tässä diplomityössä edellä mainittuihin ongelmiin pyritään löytämään yhtenäinen ratkaisu kotireititintä apuna käyttäen. Työssä analysoidaan uudentyyppisen kotireitittimen vaatimuksia käyttämällä hyväksi joukkoa käyttötapauksia. Vaativuusanalyysin perusteella luodaan malli, joka sisältää seuraavat pääkomponentit. (i) Virtuaalisointitekniikkaan pohjautuva kotireititinarkkitehtuuri. (ii) Kotireititinperustainen mekanismi yhteisöverkostoiden pystyttämiseen kotiverkkojen välillä. (iii) Hajautettu tiedostojärjestelmä yhteisöverkkojen pystyttämiseksi ja parannetun sisällönhallinnan ja sisällön jakamisen mahdollistamiseksi. (iv) Mekanismeja joiden avulla vierailevat käyttäjät voivat hyödyntää muiden käyttäjien kotireitittimien resursseja. Työssä. toteutetaan em. ydintoimintoja laaditun mallin perusteella ja toteutuksen toimivuus verifioidaan käyttötapauksiin perustuvalla testauksellaToday over half of the European homes have a broadband Internet connection. Typically, this connection is enabled through a residential gateway device at the users' premises. In addition to facilitating triple play services, this gateway also forms the core of users' home networks by connecting their network-enabled devices. While the number and the size of such home networks keep on increasing, three major problems can be identified in current systems. First, home network management is getting increasingly complex, and a growing number of networking technologies and connected devices must be supported and managed. Second, content management has become difficult. Users are generating an increasing amount of content and this content is stored (and sometimes shared) in an almost anarchical manner across different home network devices as well as online. Third, new network-enabled services, such as e-health systems, are emerging, but are typically poorly integrated into existing home networks. There is a clear need for home networking solutions that address these problems. In this thesis, we adopt a gateway-centric approach to address these problems in a unified manner. We concretise the requirements for a next generation residential gateway by analysing a set of future home networking use cases. These requirements serve as input to our gateway system design. In summary, our design includes the following main components. (i) A residential gateway architecture based on virtualization. This enables new features and new ways to implement the other components of our design. (ii) A gateway-based mechanism to set up community networks between different home networks. (iii) A distributed file system to establish community networks and to enable improved content management and sharing. (iv) Mechanisms for visiting gateway users to utilize other users' gateway resources. We implement these core functionalities and develop a proof-of concept prototype. We successfully validate our prototype through use case driven testbed experiments. Finally, we believe that the insights gained from this study and the prototype implementations are important overall contributions that can be used in the future research to further explore the limitations and opportunities of this gateway-centric approach

    Study of the development of an Io T-based sensor platform for e-agriculture

    Get PDF
    E-agriculture, sometimes reffered as 'ICT in agriculture' (Information and Communication technologies) or simply "smart agriculture", is a relatively recent and emerging field focused on the enhacement on agricultural and rural development through improved information and communication processes. This concept, involves the design, development, evaluation and application of innovative ways to use IoT technologies in the rural domain, with a primary focus on agriculture, in order to achieve better ways of growing food for the masses with sustainability. In IoT-based agriculture, platforms are built for monitoring the crop field with the help of sensors (light, humidity, temperature, soil moisture, etc.) and automating the irrigation system. The farmers can monitor the field conditions from anywhere and highly more efficient compared to conventional approaches

    Intrusion detection system for the Internet of Things based on blockchain and multi-agent systems

    Get PDF
    With the popularity of Internet of Things (IoT) technology, the security of the IoT network has become an important issue. Traditional intrusion detection systems have their limitations when applied to the IoT network due to resource constraints and the complexity. This research focusses on the design, implementation and testing of an intrusion detection system which uses a hybrid placement strategy based on a multi-agent system, blockchain and deep learning algorithms. The system consists of the following modules: data collection, data management, analysis, and response. The National security lab–knowledge discovery and data mining NSL-KDD dataset is used to test the system. The results demonstrate the efficiency of deep learning algorithms when detecting attacks from the transport layer. The experiment indicates that deep learning algorithms are suitable for intrusion detection in IoT network environment

    Internet of Things From Hype to Reality

    Get PDF
    The Internet of Things (IoT) has gained significant mindshare, let alone attention, in academia and the industry especially over the past few years. The reasons behind this interest are the potential capabilities that IoT promises to offer. On the personal level, it paints a picture of a future world where all the things in our ambient environment are connected to the Internet and seamlessly communicate with each other to operate intelligently. The ultimate goal is to enable objects around us to efficiently sense our surroundings, inexpensively communicate, and ultimately create a better environment for us: one where everyday objects act based on what we need and like without explicit instructions

    Ă„lypuhelin kotiverkkojen luottamusankkurina

    Get PDF
    Kun tietoverkot kodeissa monimutkaistuvat, eivät kotikäyttäjät osaa tai halua enää ylläpitää niitä. Kotiverkkojen ylläpito ei eroa nykyisin paljon yritysympäristöistä. Käyttäjältä vaaditaan läsnäolo, tunnukset ja tietämys laitteiden operointiin. Näitä vaatimuksia täytyy soveltaa, jos ylläpito ulkoistettaisiin ja pääsy kotiverkkoihin sallittaisiin. Luotettava toimija on palkattava ja jaettava tälle tunnistautumiskeino sekä pääsy kohdelaitteelle ulkoa käsin. Tämä edellyttää ennakkotoimia ja tunnistautumisavainten jakelua. Käyttäjän älypuhelimessa toimiva sovellus toimii tässä luotettuna toimijana. Matkapuhelinliittymällään käyttäjä on jo osa luotettua tilaajarekisteriä, ja tätä ominaisuutta käytetään hyväksi työssä luottamuksen rakentajana. Matkapuhelintunnistuksena käytetään SIM-kortin tilaajatietoa EAP-menetelmällä. EAP-SIM-pohjaisen tunnistuksen toimivuus esitetään käyttöympäristössä, jossa on simuloitu SIM-kortti ja matkapuhelinoperaattori. Periaatteena on ollut käyttää olemassaolevia tekniikoita yhdistäen niitä uusiin alueisiin, kuten homenet-määritysten kotiverkkoihin ja edustajalle ulkoistettuun hallintaan. Tunnistus- ja valtuutustietojen välittämisen hoitaa WPA2 Enterprise RADIUS-ympäristössä. Välttääksemme monimutkaisuutta ja tarpeetonta hienorakeisuutta, käytämme yksinkertaista hallintaverkkomallia, jonka rajalla on kotiverkosta muuten erillään oleva älypuhelin. Tuloksena näytetään, että matkapuhelimella tehty tunnistautuminen luo luottamusankkurin ulkoisen edustajan ja kodin hallintaverkon välille avaten edustajalle hallintayhteyden kotikäyttäjän valvonnassa. SIM-tunnistuksen hyötyjä ovat vahva tunnistus ja laaja käyttäjäkanta. Haittoina ovat riippuvuus teleoperaattorista, käyttäjän identiteetin paljastumisen uhka ja ei-toivottu automaattinen tunnistautuminen.Today, home networks are complex, and the home owners do not necessarily want to administer all aspects of their networks. Configuring home network devices does not differ much from configuring enterprise devices. One needs access, credentials to login and knowledge to operate the device. If the configuration is outsourced to external parties and done remotely, those requirements need adaptation. Access to an end device from the outside must be provided, a trusted operator must be hired, and login credentials shared. For this purpose, some previously set provisioning and distribution of authentication keys is needed. In this work, an application running on a user's smartphone represents this trusted operator. The fact that the mobile phone subscribers already are part of a reliable infrastructure is used in the study as a trusted base. To benefit from the mobile identification, it is shown how the authentication and authorization are done using an extendable authentication profile (EAP) and a SIM card. A theory to use EAP-SIM authentication at home is presented, and to demonstrate that it works, a simulated testbed is built, tested, and analyzed. The idea is to reuse existing techniques by combining them with such new areas as homenet and delegated management. Authentication claims are transported with WPA2 Enterprise. To further avoid complexity and granularity, we only use a simple model of management network. As a result, we show that the smartphone authentication provides a trust anchor between a configuration agent and the home network. The home network management can be controlled via the smartphone while keeping the local phone user still in control. The benefits of using the SIM are that it is considered strong, and it has a large existing user base, while its disadvantages include dependency onto the mobile operator. Additionally, there remain challenges in keeping the SIM's identity private and in disabling unwanted re-authentications
    • …
    corecore