9 research outputs found

    Hands-On Experience with UWB : Angle of Arrival Accuracy Evaluation in Channel 9

    Get PDF
    This paper evaluates IEEE 802.15.4z standard- compliant NXP SR040 and SR150 chips in Angle of Arrival (AoA) capabilities in Channel 9 (7.737—8.237 GHz) of the Ultra-WideBand (UWB) spectrum. Due to the shorter wavelength, higher frequencies may encounter certain limitations when it comes to harsh environments, as more reflections and multipath propagation can occur. Furthermore, they also can be affected by their enclosure used to protect the electronics in such an environment, which needs to be taken into account during product design. This work presents the results of the evaluation measurement scenario relatable to real-life use cases and concludes potentially valuable insight important for consideration when creating a new UWB product. Besides a basic overview of the theoretical estimation of AoA by Time Difference of Arrival (TDoA) and Phase Difference of Arrival (PDoA), and the evaluation of the corresponding results, the main contribution is the repeatable topology considered for the conducted measurements. The presented results allow vendors to compare their solutions with the various radio chips or antenna configurations.acceptedVersionPeer reviewe

    Performance Analysis of Different LoRaWAN Frequency Bands for mMTC Scenarios

    Get PDF
    The possibility of utilizing different frequencies for the LoRaWAN is a key component which, together with the other parameters, i.e., (i) bandwidth, (ii) spreading factor, (iii) coding rate, and (iv) transmission power, defines the communication performance. In this paper, we present the substantive im- provements for both the end devices and the radio access network (gateways) to enhance the data rates and decrease the communication latency. The implementation changes were made for the publicly available LoRaWAN module “signetlabdei” for Network Simulator 3. Utilizing the frequency 2.4GHz, the transmission time in the LoRaWAN network has improved by 80 % decreasing from 75 ms to 14 ms. The frequency 2.4 GHz for the EU region also showed the best performance due to the extended bandwidth (transmission success above 90%) in the case of the mMTC scenario with thousands of devices deployed. Together with the updated LoRaWAN module, the reported results are expected to serve as a building block for mMTC- oriented simulation scenarios.acceptedVersionPeer reviewe

    Smart Metering Cybersecurity—Requirements, Methodology, and Testing

    Get PDF
    This paper addresses the current challenges in cybersecurity of smart metering infrastructure, specifically in relation to the Czech Decree 359/2020 and the DLMS security suite (device language message specification). The authors present a novel testing methodology for verifying cybersecurity requirements, motivated by the need to comply with European directives and legal requirements of the Czech authority. The methodology encompasses testing cybersecurity parameters of smart meters and related infrastructure, as well as evaluating wireless communication technologies in the context of cybersecurity requirements. The article contributes by summarizing the cybersecurity requirements, creating a testing methodology, and evaluating a real smart meter, using the proposed approach. The authors conclude by presenting a methodology that can be replicated and tools that can be used to test smart meters and the related infrastructure. This paper aims to propose a more effective solution and takes a significant step towards improving the cybersecurity of smart metering technologies

    Improving the Precision of Wireless Localization Algorithms: ML Techniques for Indoor Positioning

    Get PDF
    Due to the tremendous increase in the number of wearable devices and proximity-based services, the need for improved indoor localization techniques becomes more significant. The evolution of the positioning from a hardware perspective is pacing its way along with various software-based approaches also powered by Machine Learning (ML). In this paper, we apply ML algorithms to the real-life collected signal parameters in an indoor localization system based on Ultra-Wideband (UWB) technology to make an analysis of the signal and classify it accordingly. The contribution aims to answer the question of whether an indoor positioning system could benefit from utilizing ML for signal parameter analysis in order to increase its location accuracy, reliability, and robustness across various environments. To this end, we compare different applications of ML approaches and detail the trade-off between computational speed and accuracy.acceptedVersionPeer reviewe

    Advanced optimization method for improving the urban traffic management

    No full text
    The Smart City as a concept of future cities anticipates the smart and efficient traffic management. Current situation of traffic management did not offer a sufficient solution and it is not wise to use the current technology to improve the traffic situation on the city roads. This paper deals with advanced methods for optimization, the genetic algorithms, for using in urban traffic management. Implementation of genetic algorithm and also implementation of classical static solution were provided. We try to prove the advantages of modern optimization methods, which could bring more fluent traffic to the cities and solve the current challenges as i.e. high emissions, big delay, higher probability of accidents. The paper provides comparison measurements of static and dynamic solution in discrete time, discussion of the possible implementation in praxis and evaluation of the advantages and disadvantages for both methods

    Lightweight structures of big numbers for cryptographic primitives in limited devices

    No full text
    The new technological approaches bring us into the digital era, where data security is a part of our everyday lives. Nowadays cryptographic algorithms, which are also recommended by international security standards, are often developed for non-limited devices and they are not suitable for limited environments. This paper deals with a lightweight solution for the structure of big numbers, which should help with ordinary recommended cryptographic algorithms in limited devices. We introduce our lightweight structure and elementary algebra for cryptographic primitives based on non-limited OpenSSL library. Last but not least, we provide experimental measurements and verification on the real scenarios

    On track of Sigfox confidentiality with end-to-end encryption

    No full text
    Abstract The last years brought many novel challenges for the Internet of Things (IoT). Low capital and operational expenditures, massive deployments of devices, reliability and security are among the most crucial ones. The recently introduced Low-power wide area (LPWA) technologies provide one possible way of addressing these challenges. In the current paper, we focus on one of the most mature LPWA technology, namely Sigfox. We provide a brief security assessment of this technology and highlight the main security imperfections. Notably, we also consider the recent changes introduced in the last revision of the Sigfox specification released in the fourth quarter of 2017. Importantly, this paper discusses the highlighted issues and compares three selected cryptographic encryption solutions (AES, ChaCha and OTP) in respect to the main IoT triad of performance, security and cost. We investigate the encryption solutions and characterize their energy consumption in a real-life implementation. The results herein presented are useful for understanding the cost of enabling security aspects and enable selecting the most efficient encryption protocol

    Energy attack in Lorawan:experimental validation

    No full text
    Abstract Myriads of new devices take their places around us every single day, making a decisive step towards bringing the concept of the Internet of Things (IoT) in reality. The Low Power Wide Area Networks (LPWANs) are today considered to be one of the most perspective connectivity enablers for the resource and traffic limited IoT. In this paper, we focus on one of the most widely used LPWAN technologies, named LoRaWAN. Departing from the traditional data-focused security attacks, in this study we investigate the robustness of LoRaWAN against energy (depletion) attacks. For many IoT devices, the energy is a limited and very valuable resource, and thus in the near future the device’s energy may become the target of an intentional attack. Therefore, in the paper, we first define and discuss the possible energy attack vectors, and then experimentally validate the feasibility of an energy attack over one of these vectors. Our results decisively show that energy attacks in LoRaWAN are possible and may cause the affected device to lose a substantial amount of energy. Specifically, depending on the device’s SF (Spreading Factor), the demonstrated attack increased the total energy consumption during a single communication event 36% to 576%. Importantly, the shown attack does not require the attacker to have any keys or other confidential data and can be carried against any LoRaWAN device. The presented results emphasize the importance of energy security for LPWANs in particular, and IoT in general
    corecore