49,888 research outputs found

    Lightweight Synchronization Algorithm with Self-Calibration for Industrial LORA Sensor Networks

    Full text link
    Wireless sensor and actuator networks are gaining momentum in the era of Industrial Internet of Things IIoT. The usage of the close-loop data from sensors in the manufacturing chain is extending the common monitoring scenario of the Wireless Sensors Networks WSN where data were just logged. In this paper we present an accurate timing synchronization for TDMA implemented on the state of art IoT radio, such as LoRa, that is a good solution in industrial environments for its high robustness. Experimental results show how it is possible to modulate the drift correction and keep the synchronization error within the requirements

    Big Data Model Simulation on a Graph Database for Surveillance in Wireless Multimedia Sensor Networks

    Full text link
    Sensors are present in various forms all around the world such as mobile phones, surveillance cameras, smart televisions, intelligent refrigerators and blood pressure monitors. Usually, most of the sensors are a part of some other system with similar sensors that compose a network. One of such networks is composed of millions of sensors connect to the Internet which is called Internet of things (IoT). With the advances in wireless communication technologies, multimedia sensors and their networks are expected to be major components in IoT. Many studies have already been done on wireless multimedia sensor networks in diverse domains like fire detection, city surveillance, early warning systems, etc. All those applications position sensor nodes and collect their data for a long time period with real-time data flow, which is considered as big data. Big data may be structured or unstructured and needs to be stored for further processing and analyzing. Analyzing multimedia big data is a challenging task requiring a high-level modeling to efficiently extract valuable information/knowledge from data. In this study, we propose a big database model based on graph database model for handling data generated by wireless multimedia sensor networks. We introduce a simulator to generate synthetic data and store and query big data using graph model as a big database. For this purpose, we evaluate the well-known graph-based NoSQL databases, Neo4j and OrientDB, and a relational database, MySQL.We have run a number of query experiments on our implemented simulator to show that which database system(s) for surveillance in wireless multimedia sensor networks is efficient and scalable

    FUZZY BASED SECURITY ALGORITHM FOR WIRELESS SENSOR NETWORKS IN THE INTERNET OF THINGS PARADIGM

    Get PDF
    Published ThesisThe world is embracing the idea of Internet of Things and Industrial Revolution 4.0. However, this acceptance of computerised evolution is met with a myriad of challenges, where consumers of this technology are also growing ever so anxious about the security of their personal data as well as reliability of data collected by the millions and even billions of sensors surrounding them. Wireless sensor networks are the main baseline technology driving Internet of things; by their very inherent nature, these networks are too vulnerable to attacks and yet the network security tools designed for conventional computer networks are not effective in countering these attacks. Wireless sensors have low computational resources, may be highly mobile and in most cases, these networks do not have a central point which can be marked as an authentication point for the sensors, any node can join or leave whenever they want. This leaves the sensors and the internet of things applications depending on them highly susceptible to attacks, which may compromise consumer information and leave security breaches in situation that need absolute security such as homes or even the cars they drive. There are many possibilities of things that could go wrong when hackers gain control of sensors in a car or a house. There have been many solutions offered to address security of Wireless Sensor Networks; however, most of those solutions are often not customised for African context. Given that most African countries have not kept pace with the development of these underlying technologies, blanket adoption of the solutions developed for consumption in the developed world has not yielded optimal results. The focus of this research was the development of an Intrusion Detection System that works in a hierarchical network structured Wireless Sensor Network, where cluster heads oversee groups of nodes and relay their data packets all the way to the sink node. This is a reactive Intrusion Detection System (IDS) that makes use of a fuzzy logic based algorithm for verification of intrusion detections. This system borrows characteristics of traditional Wireless Sensor Networks in that it is hosted external to the nodes; that is, on a computer or server connected to the sink node. The rational for this is the premise that developing the system in this manner optimises the power and processing resource of nodes because no part of the IDS is found in the nodes and they are left to focus purely on sensing. The Intrusion Detection System makes use of remote Over The Air programming to communicate with compromised nodes, to either shut down or reboot and is designed with the ZigBee protocol in mind. Additionally, this Intrusion Detection System is intended to being part of a larger Internet of Things integration framework being proposed at the Central University of Technology. This framework is aimed at developing an Internet of Things adoption strategy customised for African needs and regionally local consumers. To evaluate the effectiveness of the solution, the rate of false detections being picked out by the security algorithm were reduced through the use of fuzzy logic systems; this resulted in an accuracies of above 90 %. The algorithm is also very light when asymptotic notation is applied, making it ideal for Wireless Sensors. Lastly, we also put forward the Xbee version of the Triple Modular Redundancy architecture, customised for Wireless sensor networks in order to beef-up on the security solution presented in this dissertation

    A Security Algorithm for Wireless Sensor Networks in the Internet of Things Paradigm

    Get PDF
    Conference ProceedingsIn this paper we explore the possibilities of having an algorithm that can protect Zigbee wireless sensor networks from intrusion; this is done from the Internet of Things paradigm. This algorithm is then realised as part of an intrusion detection system for Zigbee sensors used in wireless networks. The paper describes the algorithm used, the programming process, and the architecture of the system developed as well as the results achieved

    Semantic Gateway as a Service architecture for IoT Interoperability

    Get PDF
    The Internet of Things (IoT) is set to occupy a substantial component of future Internet. The IoT connects sensors and devices that record physical observations to applications and services of the Internet. As a successor to technologies such as RFID and Wireless Sensor Networks (WSN), the IoT has stumbled into vertical silos of proprietary systems, providing little or no interoperability with similar systems. As the IoT represents future state of the Internet, an intelligent and scalable architecture is required to provide connectivity between these silos, enabling discovery of physical sensors and interpretation of messages between things. This paper proposes a gateway and Semantic Web enabled IoT architecture to provide interoperability between systems using established communication and data standards. The Semantic Gateway as Service (SGS) allows translation between messaging protocols such as XMPP, CoAP and MQTT via a multi-protocol proxy architecture. Utilization of broadly accepted specifications such as W3C's Semantic Sensor Network (SSN) ontology for semantic annotations of sensor data provide semantic interoperability between messages and support semantic reasoning to obtain higher-level actionable knowledge from low-level sensor data.Comment: 16 page

    Entropy based routing for mobile, low power and lossy wireless sensors networks

    Full text link
    [EN] Routing protocol for low-power and lossy networks is a routing solution specifically developed for wireless sensor networks, which does not quickly rebuild topology of mobile networks. In this article, we propose a mechanism based on mobility entropy and integrate it into the corona RPL (CoRPL) mechanism, which is an extension of the IPv6 routing protocol for low-power and lossy networks (RPL). We extensively evaluated our proposal with a simulator for Internet of Things and wireless sensor networks. The mobility entropy-based mechanism, called CoRPL+E, considers the displacement of nodes as a deciding factor to define the links through which nodes communicate. Simulation results show that the proposed mechanism, when compared to CoRPL mechanism, is effective in reducing packet loss and latency in simulated mobile routing protocol for low-power and lossy networks. From the simulation results, one can see that the CoRPL+E proposal mechanism provides a packet loss reduction rate of up to 50% and delays reduction by up to 25% when compared to CoRPL mechanism.The author(s) disclosed receipt of the following financial support for the research, authorship, and/or publication of this article: This research was funded by SIDIA Institute of Science and Technology, by Coordenacao de Aperfeicxoamento de Pessoal de Nivel Superior (CAPES), by Fundacao de Amparo a Pesquisa do Estado do Amazonas (FAPEAM)-support programs (Programa Primeiros Projetos (PPP) and Programa de Tecnologia da Informacao na Amazonia (PROTI)-Amazonia-Mobilidade), by Camara Tecnica de Reconstrucao e Recuperacao de Infraestrutura (CT-INFRA) of Ministerio da Ciencia, Tecnologia, Inovacoes e Comunicacoes(MCTI)/Conselho Nacional de Desenvolvimento Cientifico e Tecnologico (CNPq), and by Secretaria de Estado de Ciencia, Tecnologia e Inovacao Amazonas (SECTI-AM) and Government of Amazon State, Brazil.Carvalho, C.; Mota, E.; Ferraz, E.; Seixas, P.; Souza, P.; Tavares, V.; Lucena Filho, W.... (2019). Entropy based routing for mobile, low power and lossy wireless sensors networks. International Journal of Distributed Sensor Networks (Online). 15(7):1-19. https://doi.org/10.1177/1550147719866134S119157Blanco-Novoa, O., Fernández-Caramés, T., Fraga-Lamas, P., & Castedo, L. (2018). A Cost-Effective IoT System for Monitoring Indoor Radon Gas Concentration. Sensors, 18(7), 2198. doi:10.3390/s18072198Ding, X., Tian, Y., & Yu, Y. (2016). A Real-Time Big Data Gathering Algorithm Based on Indoor Wireless Sensor Networks for Risk Analysis of Industrial Operations. IEEE Transactions on Industrial Informatics, 12(3), 1232-1242. doi:10.1109/tii.2015.2436337Rashid, B., & Rehmani, M. H. (2016). Applications of wireless sensor networks for urban areas: A survey. Journal of Network and Computer Applications, 60, 192-219. doi:10.1016/j.jnca.2015.09.008Laurindo, S., Moraes, R., Nassiffe, R., Montez, C., & Vasques, F. (2018). An Optimized Relay Selection Technique to Improve the Communication Reliability in Wireless Sensor Networks. Sensors, 18(10), 3263. doi:10.3390/s18103263Airehrour, D., Gutierrez, J., & Ray, S. K. (2016). Secure routing for internet of things: A survey. Journal of Network and Computer Applications, 66, 198-213. doi:10.1016/j.jnca.2016.03.006Mesodiakaki, A., Zola, E., Santos, R., & Kassler, A. (2018). Optimal user association, backhaul routing and switching off in 5G heterogeneous networks with mesh millimeter wave backhaul links. Ad Hoc Networks, 78, 99-114. doi:10.1016/j.adhoc.2018.05.008Marszałek, Z., Woźniak, M., & Połap, D. (2018). Fully Flexible Parallel Merge Sort for Multicore Architectures. Complexity, 2018, 1-19. doi:10.1155/2018/8679579Fotouhi, H., Moreira, D., & Alves, M. (2015). mRPL: Boosting mobility in the Internet of Things. Ad Hoc Networks, 26, 17-35. doi:10.1016/j.adhoc.2014.10.009Barcelo, M., Correa, A., Vicario, J. L., Morell, A., & Vilajosana, X. (2016). Addressing Mobility in RPL With Position Assisted Metrics. IEEE Sensors Journal, 16(7), 2151-2161. doi:10.1109/jsen.2015.2500916Bouaziz, M., Rachedi, A., & Belghith, A. (2019). EKF-MRPL: Advanced mobility support routing protocol for internet of mobile things: Movement prediction approach. Future Generation Computer Systems, 93, 822-832. doi:10.1016/j.future.2017.12.015Fotouhi, H., Moreira, D., Alves, M., & Yomsi, P. M. (2017). mRPL+: A mobility management framework in RPL/6LoWPAN. Computer Communications, 104, 34-54. doi:10.1016/j.comcom.2017.01.020Iova, O., Picco, P., Istomin, T., & Kiraly, C. (2016). RPL: The Routing Standard for the Internet of Things... Or Is It? IEEE Communications Magazine, 54(12), 16-22. doi:10.1109/mcom.2016.1600397cmFotouhi, H., Alves, M., Zamalloa, M. Z., & Koubaa, A. (2014). Reliable and Fast Hand-Offs in Low-Power Wireless Networks. IEEE Transactions on Mobile Computing, 13(11), 2620-2633. doi:10.1109/tmc.2014.2307867Kamgueu, P. O., Nataf, E., & Ndie, T. D. (2018). Survey on RPL enhancements: A focus on topology, security and mobility. Computer Communications, 120, 10-21. doi:10.1016/j.comcom.2018.02.011Park, J., Kim, K.-H., & Kim, K. (2017). An Algorithm for Timely Transmission of Solicitation Messages in RPL for Energy-Efficient Node Mobility. Sensors, 17(4), 899. doi:10.3390/s17040899Stanoev, A., Filiposka, S., In, V., & Kocarev, L. (2016). Cooperative method for wireless sensor network localization. Ad Hoc Networks, 40, 61-72. doi:10.1016/j.adhoc.2016.01.003Wallgren, L., Raza, S., & Voigt, T. (2013). Routing Attacks and Countermeasures in the RPL-Based Internet of Things. International Journal of Distributed Sensor Networks, 9(8), 794326. doi:10.1155/2013/794326Raza, S., Wallgren, L., & Voigt, T. (2013). SVELTE: Real-time intrusion detection in the Internet of Things. Ad Hoc Networks, 11(8), 2661-2674. doi:10.1016/j.adhoc.2013.04.014Zhang, K., Liang, X., Lu, R., & Shen, X. (2014). Sybil Attacks and Their Defenses in the Internet of Things. IEEE Internet of Things Journal, 1(5), 372-383. doi:10.1109/jiot.2014.2344013Mayzaud, A., Sehgal, A., Badonnel, R., Chrisment, I., & Schönwälder, J. (2015). Mitigation of topological inconsistency attacks in RPL-based low-power lossy networks. International Journal of Network Management, 25(5), 320-339. doi:10.1002/nem.1898Navidi, W., & Camp, T. (2004). Stationary distributions for the random waypoint mobility model. IEEE Transactions on Mobile Computing, 3(1), 99-108. doi:10.1109/tmc.2004.126182

    Internet of Things over future internet

    Get PDF
    Everyday objects surrounding us including numerous sensors weaved into the daily fabric of life are becoming online, that is, readable and controllable via Internet, these days. By providing a new ecosystem of information, this notion, termed Internet of Things (IoT) will drastically change our ways to interact with real world. Meanwhile, current Internet is facing various challenges such as exponential growth in bandwidth demand. The realization of IoT is also putting current Internet under great pressure due to its unprecedented scale—according to some forecasts, IoT, an integral part of the “future” Internet, will consist of over 50 billion connected things. To cope with such bandwidth demand and complexity as well as to solve other issues, for example, seamless wireless access and mobility support, and security, with current Internet, new architectures for the future Internet have been proposed, for example, information/content centric network architectures and cloud-computing centric network architectures. However, several questions still remain: how IoT will be supported in the future Internet architectures, that is, when deploying large-scale wireless sensor networks do we need to fully integrate embedded sensors with Internet or use dedicated gateways to bridge sensors and Internet similar to state-of-the-art technologies? The aim of this Special Issue is to answer various open questions in realizing IoT over future Internet technologies. The Special Issue includes extended papers forwarded from the seventh International Conference on Ubiquitous and Future Networks (ICUFN 2015) and other contributions from outside the conference highly related to IoT in future Internet. Specifically, 6 high-quality papers out of 18 submitted have been accepted

    Optimization of A Smart IOT Gateway

    Get PDF
    In recent years, the Internet of Things (IOT) has attracted many attentions. It allows a number of objects that have been embedded with wired or wireless communication interfaces to automatically communicate and interact with each other. The IOT is a system, combination of embedded controllers, sensors, software’s and network. After internet and mobile communication, IOT is regarded as the third wave of information because of its huge market prospects. The development of IOT can support a variety of applications including Intelligent Art, Intelligent Logistics, Intelligent Medicine & Healthcare, Intelligent Transportation, Intelligent Power, Smart Life etc. IOT Gateway plays an important role in IOT applications since it bridges between wireless sensor networks with traditional communication networks or internet. This paper includes an IOT Gateway system based on Zigbee and Wi-Fi protocols according to the presented data transmission between wireless sensor networks and mobile communication networks, typical IOT application scenarios and requirements from telecom operators, protocol conversion of different sensor network protocols, and control functionalities for sensor networks, and an implementation of prototyping system and system validation is given
    • …
    corecore