Next Article in Journal
An Automated Instance Segmentation Method for Crack Detection Integrated with CrackMover Data Augmentation
Previous Article in Journal
Ultra-Short-Term Offshore Wind Power Prediction Based on PCA-SSA-VMD and BiLSTM
Previous Article in Special Issue
5G-AKA-FS: A 5G Authentication and Key Agreement Protocol for Forward Secrecy
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

An IoT System for Air Pollution Monitoring with Safe Data Transmission

by
Janusz Bobulski
*,†,
Sabina Szymoniak
and
Kamila Pasternak
Department of Computer Science, Czestochowa University of Technology, 42-201 Czestochowa, Poland
*
Author to whom correspondence should be addressed.
These authors contributed equally to this work.
Sensors 2024, 24(2), 445; https://doi.org/10.3390/s24020445
Submission received: 25 October 2023 / Revised: 1 December 2023 / Accepted: 9 January 2024 / Published: 11 January 2024

Abstract

:
Air pollution has become a global issue due to rapid urbanization and industrialization. Bad air quality is Europe’s most significant environmental health risk, causing serious health problems. External air pollution is not the only issue; internal air pollution is just as severe and can also lead to adverse health outcomes. IoT is a practical approach for monitoring and publishing real-time air quality information. Numerous IoT-based air quality monitoring systems have been proposed using micro-sensors for data collection. These systems are designed for outdoor air quality monitoring. They use sensors to measure air quality parameters such as C O 2 , C O , P M 10 , N O 2 , temperature, and humidity. The data are acquired with a set of sensors placed on an electric car. They are then sent to the server. Users can subscribe to the list and receive information about local pollution. This system allows real-time localized air quality monitoring and sending data to customers. The work additionally presents a secure data transmission protocol ensuring system security. This protocol provides system-wide attack resiliency and interception, which is what existing solutions do not offer.

1. Introduction

This paper is an extended version of our conference paper: “Air pollution monitoring and information distribution system”, Proceedings of the CORES and IP&C Conferences 2023 [1].
Rapid urbanisation and industrialisation have given rise to a global issue of air pollution. Exceeding recommended national limits is a common issue faced by many countries. Moreover, it should be emphasised that there are studies that suggest no level of exposure to single pollutants below which adverse health effects are not seen [2]. Bad air quality’s most significant environmental health risk significantly impacts Europe’s population. Bad air quality is known to cause various health problems, like lower respiratory infections, trachea, bronchus, lung cancers, ischemic heart diseases and strokes. Air pollutants can be divided into two categories: internal (indoor) and external (outdoor) air pollutants [3]. Air pollution that affects the entire atmosphere is called outdoor air pollution. This pollution type is caused by various air pollutants emitted into the atmosphere from sources such as automobiles, chemical industries and the burning of fossil fuels. Such pollutants mainly consist of carbon monoxide C O , ozone O 3 , nitrogen oxides N O x , sulfur dioxide S O 2 , and particulate matter of diverse particle measures [4]. According to the WHO [5], the number of ambient air pollution-attributable deaths in 2019 exceeded 4,100,000 worldwide, 500,000 in Europe and 36,000 in Poland. It should be emphasised that internal air pollution is as severe a problem as outdoor air pollution. Air pollution classified as indoor can be found in buses, metro, offices, hospitals, schools, libraries, etc. [6]. One common source of internal air pollution is using polluting fuels and devices in households. Significant indoor air impurities are N O x ,   S O 2 ,   O 3 ,   C O , PM and microorganisms. Exposure to indoor air pollutants can result in harmful health outcomes. Household air pollution deaths 2019 exceeded 3,200,000 worldwide and 150,000 in Europe [7].
Since air pollution is a critical global issue, creating a system for monitoring and publishing real-time air-grade knowledge seems reasonable. The Internet-of-Things (IoT) is an approach that can be a suitable and effective solution to this issue. The IoT is a network that collects vast doses of data from diverse devices connected to more extensive schemes. The data gathered by this network are converted into useful information. More detailed knowledge about IoT can be found in [8].
The main contributions of this paper are as follows:
  • project of an IoT system for air pollution monitoring,
  • use of a data transmission security protocol,
  • adaptation of MQTT and Amelia protocols for securing communication,
  • automated and informal security analysis of the Amelia protocol adaptation.

2. Related Works

In literature, many IoT-based monitoring systems use micro-sensors for data gathering [9,10,11,12,13,14,15,16,17]. It should be mentioned that there are studies that propose a system for both internal and external air pollution, e.g., [9]. This work studies an IoT-based system implemented in a university area. The platform proposed in [9] offers individual course monitoring established on Wi-Fi tracking. Environmental monitoring refers to observing and measuring the environment to gather information about its condition and any changes that may occur. It involves using various tools and techniques to collect data on factors such as air quality, water quality, soil conditions, and weather patterns. The data collected through this process is used to identify potential environmental issues and to inform decisions regarding the management and protection of the natural environment. The system allows measuring multiple ecological parameters such as noise level, light, temperature, humidity, C O and N O 2 concentration. The monitoring system proposed in this paper is built based on the MiCS-4514 MicroElectroMechanicalSensor (MEMS) and popular hardware—Raspberry Pi and Arduino, which has a shallow level of safety data transmission.
Most studies focus only on one type of air pollution: indoor [10,11,12] or outdoor [13,14,15,16,17]. One of the examples of the former can be found in [10]. This research proposes a real-time monitoring procedure for gauging ambient air quality, which is low-cost, portable and based on IoT without transmission protection. The detection unit measures air grade elements such as C O 2 , C O , P M 10 , N O 2 using the sensors GP2Y1010AU, MH-Z14, MICS-4514 and DHT22. Another low-cost IoT system for real-time indoor air quality monitoring, without transmission protection, is proposed in [11]. This system uses the ESP8266 module as an analysing and transmission unit and the MICS-6814 detector as a sensing unit. Such a sensor allows for collecting data about a few air rate notes, such as C O , N O 2 , C 3 H 8 (propane), C 4 H 10 (butane), C H 4 (methane), H 2 (hydrogen). Moreover, the system provides mobile software for constant announcements. Therefore, the user is alerted when the concentration of gases is exceeded. An attractive indoor air quality monitoring study is presented in [12]. The motivation for this research was that during the COVID-19 pandemic, people spent a lot of time in indoor environments. This paper proposes low-cost IoT sensor networks for indoor air quality assessment with standard unprotected data transmission. The presented system uses Plantower PMS5003 P M sensors deployed in four rooms (bedroom, living room, kitchen and office). Based on the data collected in the experiment, it was concluded that P M levels exceeded WHO 2021 annual ambient particulate concentration guidelines in all rooms.
An example of a system monitoring outdoor air pollution is proposed in [13]. In this work, the authors presented the innovation and implementation of an IoT detector instrument. Sensors adopted in this approach were both fixed and moving IoT sensor devices. To build the real-time air quality monitoring IoT sensing network, authors used i.a. Arduino Mega, Raspberry Pi, GPS Sensor, temperature and humidity sensor, microdust sensor and carbon dioxide sensor. It should be mentioned that this study adopted a machine learning technique to design an air quality prediction model. A prototype of a low-cost IoT system for Air Quality Index (AQI) monitoring is proposed in [14]. This paper used a Raspberry Pi module, a low-cost PM sensor, and some environmental detectors to measure diverse parameters such as temperature, humidity, and pressure.
Moreover, the same three-layered hierarchical distributed architecture for traffic flow monitoring was used. In the paper, [15], a Markov chain-based IoT approach is created to monitor, analyse and predict metropolitan air quality. The offered system is merged with an automobile to collect air quality data. As the microcontroller board, the authors used an Arduino Mini Pro. The sensing system operates an MQ2 gas sensor for counting C O concentration and a GP2Y1010AU0F visual detector for P M 10 and P M 2.5 concentrations. Another air quality monitoring system employing IoT methods for outdoor air pollution is proposed in [16]. The authors used a low-power vast space network to transmit the real-time data collected by portable particle matter, humidity and temperature sensors. The data gathered in the urban area confirms the correlation of the P M 2.5 concentration with many meteorological variables (e.g., the wind speed). An example of an IoT-based air pollution monitoring system can also be found in [17]. The system proposed by the authors employs multiple sensors (MQ135, MQ9 and MQ2) capable of detecting various air pollutants or gases. Using these sensors in conjunction with ESP Microntoroller, they have created a system to monitor the collected data through the smartphone Blynk application with a standard security level.

3. Proposed IoT System

3.1. System Structure

Air pollution can affect people’s life processes, deteriorate their health, and even cause death. In this case, air quality monitoring is a crucial part of daily life. The proposed system monitors air quality in some areas and alerts concerned locals to potential dangers. The system consists of four layers: data collection, end devices, central server and communication.
Only autonomous vehicles (AVs) operate in the data collection layer [18]. These vehicles are equipped with air pollution sensors and high-performance computing servers. AVs move around specific urban areas to collect and process air quality data. The air pollution sensors communicate with servers via GSM modules. The processed data is automatically made available to customers through messages containing statistical data and a map of a given area with marked measurement points of air pollutant concentrations. After finishing AV work, they return to the base and connect with the central server to transmit all collected data.
All IoT devices, like smartphones or tablets, work in the end devices layer. Users interested in air quality information can connect their devices and read shared information. Users should install a client application on their devices. The client application allows logging into the server and downloading air quality information. Figure 1 shows the air quality monitoring system’s main part structure that creates data collection and end device layers.
A central server works in the last system layer. This is also a high-performance computing server with different tasks than servers installed at AVs and with high memory resources. The central server manages all the work of autonomous vehicles through the server application. The first server’s task is defining routes where vehicles will move in a given area, and the server administrator can determine which streets will visit each car during the current route. The second server’s task is to collect and process all data about air quality. After finishing the route, AV must return to the base, connect to the central server, and send each collected information. Next, the central server will process each AV’s information, prepare statistics and charts, or determine dependencies. The third server’s task is to publish these statistics, charts or other summaries for the whole city on its website. Figure 1 summarises central server layer work.
The communication layer controls and secures two types of communication: between AV and devices and between the central server and AV. For the first communication type, we use the Message Queue Telemetry Transport (MQTT) protocol [19,20]. This is a simple, secure and dependable data transmission protocol. Further, it is suitable for devices that can only communicate at a certain transmission speed. The MQTT supports and secures users’ (devices’) registration and authentication processes.
Moreover, this protocol resists many attacks [20]. The MQTT base is the publish-and-subscribe model. The typical publish-and-subscribe model distinguishes three roles: Publisher, Subscriber and Broker. We assumed publisher, subscriber, main broker, and semi-broker roles in the proposed system.
The main broker role performs the central server. It shares information about air quality in the whole surveyed area and Semi-Brokers in the network. In Semi-Brokers’ case, the Main-Broker shares information about the area they are visiting. The autonomous vehicle is a Publisher and Semi-Broker. The server installed in AV allows the performing of these two roles. AV collects data about pollution in a specific urban area. Next, the server processes them and publishes them for the user. Users can connect to the AV’s server to download information. The server publishes information on a specific topic, such as air quality on some street, the concentration of the selected substance in the air, or a mix of such information. Thus, the end device is a subscriber. It subscribes to a specific Publisher’s topic or topics.
First, the user must connect to the Main-Broker to learn and subscribe to the appropriated Semi-Broker’s parameters. The user can connect to the nearest Semi-Broker or one of the Semi-Brokers in the network. In the first case, the Main-Broker will send them the parameters of the nearest Semi-Broker based on his geographical coordinates. In the second case, the user will choose one of the Semi-Brokers from the list in the application.
We adopted the Amelia protocol mentioned in [21] for the second communication type. The protocol’s default version protects against false links to Internet events. The first phase of this protocol provides a user registration process with a trusted Distribution Centre. The second phase of this protocol provides the validation process of a link to an event with a trusted Authentication Centre. Further, during this phase, users received symmetric keys for further communication.
We observed that the Amelia protocol is suitable for securing communication between AV and the central server, and we modified it. First, we combined a trusted Distribution Centre and Authentication Centre functionalities. The central server will generate necessary cryptographic objects, store information for communication and authenticate users (AVs, in the case of our solution). Hence, the scheme for the Amelia protocol’s registration phase in Alice–Bob notation will be as follows:
α 1 A V C S : { i ( A V ) , T A V } K C S +
α 2 C S A V : { # h a s h ( { U I D A V , i ( A V ) } K A V + ) ,
T C S A V } K A V +
α 3 A V C S : { T C S A V } K C S +
In this notation:
  • { M } K means the message M encrypted by key K,
  • A V means the autonomous vehicle,
  • C S means the central server,
  • i ( A V ) is a AV’s text identifier,
  • T A V is a AV’s timestamp,
  • K u + is the public key of u of the protocol participant, for example, the key K C S + is the public key of the central server,
  • U I D A V stands for the numeric user identifier,
  • # h a s h ( { U I D A V , i ( A V ) } K A V + ) means the execution of the hash function on the ciphertext { U I D A V , i ( A V ) } K A V + ,
  • T C S A V means the timestamp generated by the central server for the unique user identifier A V .
In the first step of this protocol, AV tries to register to CS by sending its text identifier and freshly generated timestamp. Next, the central server checks its database to see if there is no such identifier. If everything is correct, it generates a numeric user identifier ( U I D A V ) and the timestamp T C S A V and stores them with AV’s text identifier. In the second step, CS sends to AV hashed identifiers with the timestamp T C S A V . Note that, the # h a s h ( { U I D A V , i ( A V ) } K A V + ) value will be used to recognize AV by CS. Otherwise, it will stop communication. In the last step, AV confirms that it received the earlier message by sending the timestamp T C S A V to CS.
The subsequent modifications we made were in the second phase of the Amelia protocol. In the protocol’s default version, the communication takes place between the user, the Authentication Center and the user who is the event organiser. In our system, AV will communicate only with the central server. We made the rest of the modifications in the message structures. Hence, the scheme of the authentication and communication phase of this protocol in Alice-Bob notation will be as follows:
α 1 A V C S : { # h a s h ( { U I D A V , i ( A V ) } K A V + ) ,
T C S A V , i ( C S ) } K C S +
α 2 C S A V : { T C S A V , T C S , K C S A V } K A V +
α 3 A V C S : { T A V , D F A V } K C S A V
In this notation:
  • { M } K means the message M encrypted by key K,
  • A V means the autonomous vehicle,
  • C S means the central server,
  • i ( u ) is the text identifier of the user u,
  • K u + is the public key of u of the participant of the protocol; for example, the key K A V + is the AV’s public key,
  • U I D A V stands for the numeric user identifier,
  • # h a s h ( { U I D A V , i ( A V ) } K A V + ) means the execution of the hash function on the ciphertext { U I D A V , i ( A V ) } K A V + ,
  • T C S A V means the timestamp generated by the central server for the unique user identifier A V ,
  • D F A V means a data file with information about air quality,
  • K C S A V is a symmetric session key shared between AV and CS.
In the first step, AV tries to authenticate to CS, sending its identifier with timestamp T C S A V and CS’s identifier. The central server validates this data in the database. If the data are correct, it generates a symmetric session key shared between AV and CS. AV and CS will use this key later in the communication. Otherwise, it will stop communication. In the last step, the autonomous vehicle sends to the central server a data file with information about air quality with freshly generated timestamp T A V . AV encrypts this message using the session key K C S A V .
The first phase must be executed once for each vehicle, but the second phase must be completed after every end of the route in the proposed system. Further, the proposed system uses secure communication channels via WiFi standards [22,23] for communication between the central server and AV, or LTE/5G standards mention [20,21] for communication between AV and devices.
Figure 2 shows the communication flow in the proposed system. We included here descriptions of each external and internal operation executed during the protocol’s steps and conditions for the subsequent steps executions. As mentioned, the MQTT network has a publisher, broker, and subscriber. The Publisher (autonomous vehicle in our solution, AV) must register on the Broker (central server, CS). In this case, it executes the first phase of the Amelia protocol. If the AV is registered correctly on CS, it can authenticate to CS, establish a session, and send data about air quality. Hence, it executes the second phase of the Amelia protocol. The sending of data to CS is equivalent to the publishing step performed by the publisher in the MQTT protocol. The Subscriber (user and his device) can subscribe to the published data. The Broker updates and publishes data for Subscribers regularly.
We verified the adaptation of the Amelia protocol using a tool for automated security protocol verification mentioned in [24]. This same tool was used to verify the Amelia protocol’s full version. Thanks to this tool, we can consider different executions of security protocols, including various time parameters such as time of composing the message, encryption/decryption times, or delay in the network, and also different network conditions (with or without attacker). We performed analysis using a computer unit with the Linux Ubuntu operating system, Intel Core i7 processor, and 16 GB RAM. Further, we used various values of time parameters during tests. The tool uses an abstract time unit [ t u ] , which means some period.
Thanks to the tool mentioned, we could execute two types of research: timed analysis and simulations of the delays in the network. During one part of the research, we assumed the following values of time parameters: mechanism and one-way hash functions eliminate impersonation attacks.
  • time of generating confidential information: T g = 1 [ t u ] ,
  • time of composing the message: T c = 1 [ t u ] ,
  • asymmetric encryption or decryption time: T e = 3 [ t u ] ,
  • symmetric encryption or decryption time: T e = 2 [ t u ] ,
  • minimal delay in the network: D m i n = 1 [ t u ] ,
  • maximal delay in the network: D m a x = 3 [ t u ] ,
  • execution time of the hash function: H = 2 [ t u ] .
For the timed analysis, the tool calculated the values of timed parameters summarised in Table 1. We observed that for each protocol part, four executions were possible: one execution with honest users and three executions with an attacker. Only executions with real users and executions with an attacker (like himself) were likely to be performed. They were executed while maintaining the imposed time conditions. Further, we analysed the messaging and learning flow in executions with the attacker who tries to impersonate other users. These executions did not meet time conditions. If the attacker wants to execute a subsequent step, he tries to establish the next session with CS and acquire appropriate knowledge. The attacker cannot obtain it because he cannot gain the necessary cryptograms or cryptographic objects to prepare messages according to protocol structure.
Next, we execute simulations of this protocol. This type of research examines the influence of delay in the network on execution time. Additionally, it demonstrates the capabilities of the attacker in a time-constrained setting. It is feasible to generate network delay values randomly based on four different probability distributions. We examined this protocol using all probability distributions implemented in the tool. This research confirmed the results of the timed analysis. Only executions with honest users and executions with an attacker (like himself) were possible to perform. The rest of the executions did not meet time conditions because of the attacker’s lack of knowledge.
Subsequently, an informal security analysis was conducted to validate our protocol’s attainment of the primary security features. We analysed such properties as anonymity and mutual authentication. Anonymity is achieved through asymmetric cryptography during the registration and authentication processes, which safeguards the user’s identity. In the context of mutual authentication, both the AV and the CS must possess a shared symmetric key to establish mutual authentication. The CS generates the key during the second authentication and communication phase step. AV and CS verify their identity during this stage by transmitting their shared timestamps and identifiers.
Additionally, we conducted an ad hoc security study to ascertain potential vulnerabilities that could compromise the effectiveness of our protocol. We analysed the aforementioned offensive scenarios. Adapting the Amelia protocol effectively mitigates replay attacks through a timestamp mechanism. The initial step involves the verification of the timestamp by each recipient. The continuation of contact is contingent upon receiving the message within the prescribed limit; otherwise, the recipient will terminate the communication. Further, this protocol mitigates the risk of a man-in-the-middle attack by incorporating a session key, which is shared among the parties involved. The encryption key employed in this context renders it impossible for the attacker to extract any constituent elements from the encrypted messages. Suppose an attacker successfully intercepts a message and attempts to transmit it during a subsequent session. In that case, the recipient will decline acceptance of the message after verifying the timestamp. Using symmetric and asymmetric encryption, timestamp mechanism, and one-way hash functions eliminates impersonation attacks.

3.2. Vehicle

During research, the critical role is to ensure the correctness of the data. Wrong data give wrong results. Therefore, any interference should be eliminated during measurements. For this reason, we used a Nissan Leaf electric car for data collection in our experiment (see Figure 3). Its most significant advantage in this case is that it does not emit air pollution during testing.

3.3. Instruments

The measuring device consists of two modules built into one Peli-type case:
  • a measuring module with a built-in suspended dust measurement system,
  • a measuring module with gas sensors working in a pump system.
Technical specification of the measuring instrument:
  • P M 10 dust range from 0 to 1999.9 μg/m3, sensitivity 0.3 μg/m3
  • P M 2.5 dust range from 0 to 999.9 μg/m3
  • V O C Volatile Organic Compounds PID 10.6 eV detection range: 0 ppm to 50 ppm, photoionization method,
  • C O range from 1 to 500 ppm, the electrochemical method
  • N O 2 range from 0 to 20 ppm, the electrochemical method
  • N O range 0 to 20 ppm, the electrochemical method
  • S O 2 range from 0 to 50 ppm, the electrochemical method
  • temperature −40 °C to 85 °C, resolution 0.1 °C
  • humidity from 0 to 100
  • pressure from 300 hPa to 1100 hPa, accuracy 100 Pa
  • GPS position (GNSS) accuracy up to 1.5 m
  • GSM/3G/LTE module
  • WiFi 2.4/5.8 GHz 802.11an.
The integrated measuring instruments have been placed in a carrying case. Such a research set has been equipped with magnetic holders to place it on the car’s roof. Thanks to such placement, the measurement of air pollution takes place at a height comparable to the height of the human nose. This solution ensures the reliability of measurements and allows us to draw valid conclusions regarding the level of air pollution and the impact of individual gases and dust on human health. The power supply for the measuring set (grey cable in Figure 4) came from the cigarette lighter socket. The set had a GPS module (black cable in the Figure 4).

3.4. Results

The Table 2 and Table 3 present data collected by the pollution measurement system discussed in the article. Measurements were taken on two different days. Each row corresponds to information gathered at a specific time (first column) and location (second, third, and fourth columns). The subsequent columns contain data regarding harmful gases and particulate matter concentration in each location. The last columns provide information about temperature and humidity, which can influence the intensity of perception of pollution.
Upon analysing the obtained results, we concluded that atmospheric pressure affects the concentration of suspended particles P M 10 and P M 2.5 , although its influence is not direct. Atmospheric pressure can impact weather conditions, which, in turn, may affect the concentration of these pollutants. The primary ways atmospheric pressure may influence P M 10 and P M 2.5 concentrations include weather cycles or thermal inversions.
Regarding weather cycles, changes in atmospheric pressure are typically associated with various weather conditions. For instance, high atmospheric pressure often favours calmer weather with reduced wind, potentially leading to increased accumulation of P M 10 and P M 2.5 particles in the atmosphere.
On the other hand, concerning thermal inversions, atmospheric pressure may influence their occurrence. Under conditions of high atmospheric pressure, thermal inversions might be more likely. Thermal inversions can trap pollutants in the lower atmospheric layers, leading to increased concentrations of suspended particles.
Additionally, atmospheric pressure changes often coincide with humidity changes, corroborated by the obtained measurement data. High humidity may promote the accumulation of suspended particles, potentially resulting in increased concentrations of P M 10 and P M 2.5 .
It is worth noting that the influence of atmospheric pressure on the concentration of suspended particles is often indirect and related to weather conditions resulting from these pressure changes. However, atmospheric pressure alone does not directly cause the increase or decrease in P M 10 and P M 2.5 concentrations.
The data obtained by the system can subsequently be made available to subscribers of the service offered by the system. There are two possibilities for the graphical presentation of measurement results. The first option is to present data in a graphic form (Figure 5), where the circle size shows the degree of pollution, and the red colour informs about exceeding the standard concentration of gases or dust. This circle is the so-called heat map that enables data visualisation that shows the size of individual values in a data set as a colour. Colour differences may be due to shade or intensity. A more intense colour (red or close to red) indicates increased pollutant concentration in the air. The heat map considers the values of all pollutants for a specific geographic point. The second way to show the results is to display numerical values (Figure 6) in a given location, and standards violations are translated into a change in the font colour. In this way, people sensitive to dust can avoid moving in the area. Meanwhile, people with poor lung ventilation due to harmful gases may be informed of the danger. Monitoring air quality in city centres using professional mobile sensors offers real-time insights into pollution levels. These sensors provide accurate data, enabling prompt actions to mitigate health risks associated with poor air quality. Improved monitoring aids in identifying pollution sources, allowing authorities to take targeted measures for cleaner air. Deploying such sensors strategically across urban areas creates a comprehensive network for continuous assessment. Accessible data from these sensors empowers citizens to make informed decisions about outdoor activities and health precautions. Real-time alerts and data dissemination to users via apps or online platforms promote awareness and proactive measures. Mobile sensor networks facilitate community engagement, fostering collaborative efforts to address air quality concerns. Regular monitoring enhances policy-making by providing evidence-based information for effective regulations. The portability of these sensors allows for flexibility in relocation, catering to dynamic changes in pollution hotspots. Employing professional mobile sensors and distributing their data to users amplifies public awareness and drives collective actions towards cleaner, healthier urban environments.

4. Conclusions

This article highlights the issue of air pollution, especially outdoors, and its severe impact on human health. IoT-based air quality monitoring systems are proposed as a practical solution to monitor and publish real-time air quality information. Several examples of IoT-based air quality monitoring systems using micro-sensors for data collection are presented for indoor and outdoor environments. The systems use various sensors to measure air quality parameters such as C O 2 , C O , P M 10 , N O 2 , temperature, and humidity. The article emphasises the need for effective air quality monitoring and the potential of IoT-based systems to address this issue. An important issue raised in this work is the security of data transmission. A data transmission protocol has been proposed to ensure security and resistance to attacks related to the interception of transmissions in a public area.
The main limitation of the system is its autonomy. Currently, fully safe and reliable autonomous vehicles have not been developed. Such a solution would allow the entire process to be automated. This will become possible when effective algorithms for vehicle autonomy are developed.
Future work will focus on developing a user-friendly interface for multiple software platforms.

Author Contributions

Conceptualization, J.B.; methodology, J.B.; software, S.S.; validation, S.S.; formal analysis, S.S.; investigation, J.B.; resources, K.P.; data curation, K.P.; writing—original draft preparation, J.B., S.S. and K.P.; writing—review and editing, J.B.; visualization, S.S.; supervision, J.B. All authors have read and agreed to the published version of the manuscript.

Funding

This research received external funding from BS-PB-1-100-3016/2023/P.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Data are contained within the article.

Conflicts of Interest

The authors declare no conflict of interest.

Abbreviations

The following abbreviations are used in this manuscript:
WHOWorld Health Organization
N O x Z nitrogen oxides
N O 2 nitrogen dioxide
S O 2 sulfur dioxide
O 3 ozone
COcarbon monoxide
PHparticulate matter
C O 2 carbon dioxide
VOCVolatile Organic Compounds
IoTInternet of Things
GPSGlobal Positioning System
GNSSGlobal Navigation Satellite Systems
AQIAir Quality of System
LPGLiquefied Petroleum Gas
AVAutonomous Vehicle
MQTTMessage Queue Telemetry Transport
GSMGroupe Spécial Mobile
3GThird Generation
LTELong Term Evolution
LATLatitude
LONLongitude
ALTAltitude
PIDPhotoionization Detectors are used for the detection volatiles at the
parts-per-million (ppm)
TempTemperature
PressPressure
HumHumanity

References

  1. Bobulski, J.; Szymoniak, S.; Pasternak, K. Air pollution monitoring and information distribution system. In Pattern Classification, Image Processing and Communications: Proceedings of the CORES and IP&C Conferences; Burduk, R., Choras, M., Kozik, R., Ksieniewicz, P., Marciniak, T., Trajdos, P., Eds.; Lecture Notes in Networks and Systems, 766; Springer: Cham, Switzerland, 2023; pp. 185–192. [Google Scholar]
  2. Velasco, R.P.; Jarosińska, D. Update of the WHO global air quality guidelines: Systematic reviews—An introduction. Environ. Int. 2022, 170, 107556. [Google Scholar] [CrossRef] [PubMed]
  3. Leung, D.Y.C. Outdoor-indoor air pollution in urban environment: Challenges and opportunity. Front. Environ. Sci. 2015, 2. [Google Scholar] [CrossRef]
  4. Kampa, M.; Castanas, E. Human health effects of air pollution. Environ. Pollut. 2008, 151, 362–367. [Google Scholar] [CrossRef] [PubMed]
  5. WHO. Available online: https://www.who.int/data/gho/data/indicators/indicator-details/GHO/ambient-air-pollution-attributable-deaths (accessed on 23 March 2023).
  6. de Gennaro, G.; Dambruoso, P.R.; Loiotile, A.D.; Di Gilio, A.; Giungato, P.; Tutino, M.; Marzocca, A.; Mazzone, A.; Palmisani, J.; Porcelli, F. Indoor air quality in schools. Environ. Chem. Lett. 2014, 12, 467–482. [Google Scholar] [CrossRef]
  7. WHO. Available online: https://www.who.int/data/gho/data/indicators/indicator-details/GHO/household-air-pollution-attributable-deaths (accessed on 23 March 2023).
  8. Gubbi, J.; Buyya, R.; Marusic, S.; Palaniswami, M. Internet of Things (IoT): A vision, architectural elements, and future directions. Future Gener. Comput. Syst. 2013, 29, 1645–1660. [Google Scholar] [CrossRef]
  9. Alvarez-Campana, M.; López, G.; Vázquez, E.; Villagrá, V.A.; Berrocal, J. Smart CEI moncloa: An iot-based platform for people flow and environmental monitoring on a Smart University Campus. Sensors 2017, 17, 2856. [Google Scholar] [CrossRef] [PubMed]
  10. Taştan, M.; Gökozan, H. Real-time monitoring of indoor air quality with internet of things-based E-nose. Appl. Sci. 2019, 9, 3435. [Google Scholar] [CrossRef]
  11. Marques, G.; Pitarma, R. A cost-effective air quality supervision solution for enhanced living environments through the internet of things. Electronics 2019, 8, 170. [Google Scholar] [CrossRef]
  12. Cowell, N.; Chapman, L.; Bloss, W.; Srivastava, D.; Bartington, S.; Singh, A. Particulate matter in a lockdown home: Evaluation, calibration, results and health risk from an IoT enabled low-cost sensor network for residential air quality monitoring. Environ. Sci. Atmos. 2023, 3, 65–84. [Google Scholar] [CrossRef]
  13. Zhang, D.; Woo, S.S. Real time localized air quality monitoring and prediction through mobile and fixed IoT sensing network. IEEE Access 2020, 8, 89584–89594. [Google Scholar] [CrossRef]
  14. Martín-Baos, J.Á.; Rodriguez-Benitez, L.; García-Ródenas, R.; Liu, J. IoT based monitoring of air quality and traffic using regression analysis. Appl. Soft Comput. 2022, 115, 108282. [Google Scholar] [CrossRef]
  15. Barthwal, A. A Markov chain–based IoT system for monitoring and analysis of urban air quality. Environ. Monit. Assess. 2023, 195, 195–235. [Google Scholar] [CrossRef] [PubMed]
  16. Paithankar, D.N.; Pabale, A.R.; Kolhe, R.V.; William, P.; Yawalkar, P.M. Framework for implementing air quality monitoring system using LPWA-based IoT technique. Meas. Sens. 2023, 26, 100709. [Google Scholar] [CrossRef]
  17. Naik, U.U.; Salgaokar, S.R.; Jambhale, S. IOT based air pollution monitoring system. Int. J. Sci. Res. Eng. Trends 2023, 9, 835–838. [Google Scholar]
  18. Bobulski, J.; Kubanek, M. Vehicle for plastic garbage gathering. In Proceedings of the 2021 International Conference on Electrical, Computer, Communications and Mechatronics Engineering (ICECCME), Mauritius, 7–8 October 2021. [Google Scholar]
  19. Zeghida, H.; Boulaiche, M.; Chikh, R. Securing MQTT protocol for IoT environment using IDS based on ensemble learning. Int. J. Inf. Secur. 2023, 22, 1075–1086. [Google Scholar] [CrossRef]
  20. Alshammari, H.H. The Internet of Things healthcare monitoring system based on MQTT protocol. Alex. Eng. J. 2023, 69, 275–287. [Google Scholar] [CrossRef]
  21. Szymoniak, S. Amelia—A new security protocol for protection against false links. Comput. Commun. 2021, 179, 73–81. [Google Scholar] [CrossRef]
  22. Yang, M.; Li, B.; Yan, Z. MAC Technology of IEEE 802.11 ax: Progress and Tutorial. Mob. Netw. Appl. 2021, 26, 1122–1136. [Google Scholar] [CrossRef]
  23. Rochim, A.F.; Harijadi, B.; Purbanugraha, Y.P.; Fuad, S.; Nugroho, K.A. Performance comparison of wireless protocol IEEE 802.11 ax vs 802.11ac. In Proceedings of the 2020 International Conference on Smart Technology and Applications (ICoSTA), Surabaya, Indonesia, 20 February 2020; pp. 1–5. [Google Scholar]
  24. Szymoniak, S. Security protocols analysis including various time parameters. Math. Biosci. Eng. MBE 2021, 18, 1136–1153. [Google Scholar] [CrossRef] [PubMed]
Figure 1. Structure of air quality monitoring system main part.
Figure 1. Structure of air quality monitoring system main part.
Sensors 24 00445 g001
Figure 2. Communication flow in the proposed system.
Figure 2. Communication flow in the proposed system.
Sensors 24 00445 g002
Figure 3. Vehicle used in experiment.
Figure 3. Vehicle used in experiment.
Sensors 24 00445 g003
Figure 4. Instrument used in experiment.
Figure 4. Instrument used in experiment.
Sensors 24 00445 g004
Figure 5. Results of measurement in the form of maps with heatmaps.
Figure 5. Results of measurement in the form of maps with heatmaps.
Sensors 24 00445 g005
Figure 6. Results of measurement in the form of maps and numbers.
Figure 6. Results of measurement in the form of maps and numbers.
Sensors 24 00445 g006
Table 1. Timed parameters used during research.
Table 1. Timed parameters used during research.
ParameterRegistration PhaseAuthentiction and Communication Phase
Minimal α 1 step time9 [ t u ] 11 [ t u ]
Minimal α 2 step time14 [ t u ] 16 [ t u ]
Minimal α 3 step time8 [ t u ] 10 [ t u ]
Maximal α 1 step time8 [ t u ] 10 [ t u ]
Maximal α 2 step time10 [ t u ] 12 [ t u ]
Maximal α 3 step time7 [ t u ] 9 [ t u ]
Minimal session time31 [ t u ] 25 [ t u ]
Maximal session time37 [ t u ] 31 [ t u ]
Timeout for α 1 step10 [ t u ] 9 [ t u ]
Timeout for α 2 step26 [ t u ] 21 [ t u ]
Timeout for α 3 step37 [ t u ] 31 [ t u ]
Table 2. The data of air quality—day 1.
Table 2. The data of air quality—day 1.
TimeLATLONALT PM 10 PM 2.5 NO2SO2NOPIDTempPressHum
[°] [°][m][μg/m3][μg/m3][ppm][ppm][ppm][ppm][°C][hPa][%]
14.11.2022 08:4651.25355522.56311209.25.40.12900.0970.1998.881007.2668.89
14.11.2022 08:4551.25355522.56311209.25.40.12900.0970.1998.881007.2668.89
14.11.2022 08:4451.25355522.563112179.68.14.30.1200.110.1958.761007.0668.9
14.11.2022 08:4351.25313522.560657183.26.93.70.13600.2230.1989.041007.1768.27
14.11.2022 08:4151.25187522.551793191.49.94.80.07800.1230.1879.511006.3866.89
14.11.2022 08:4051.25004822.552458198.57.64.40.14200.1710.1829.631004.8965.52
14.11.2022 08:3951.24904322.554722192.211.24.90.24900.8580.2079.681005.2865.99
14.11.2022 08:3851.24963822.55818199.48.64.60.11600.2840.1839.821004.9465.06
14.11.2022 08:3751.25127322.558928182.194.80.09700.3530.1819.941006.0664.2
14.11.2022 08:3651.25325522.561388172.29.14.70.07100.1060.17310.211007.2862.32
14.11.2022 08:3551.25325522.561388172.219.510.90.07600.2590.17610.611007.3361.47
14.11.2022 08:3451.25309322.563277171.97.94.70.15700.120.17211.11007.5258.85
14.11.2022 08:3351.25347722.56299177.87.13.80.07300.1010.1711.861007.4355.57
Table 3. The results of measurements—day 2.
Table 3. The results of measurements—day 2.
TimeLATLONALTPM10 PM 2.5 NO2SO2NOPIDTempPressHum
[°][°][m][μg/m3][μg/m3][ppm][ppm][ppm][ppm][°C][hPa][%]
2023-05-08 14:0050.82351319.11048240.14.81.900.0670.250.17519.96998.1524.68
2023-05-08 13:5950.82337819.110498243.65.91.700.0630.2630.17719.3998.1325.94
2023-05-08 13:5850.82080319.111305254.55.62.200.0430.290.17218.86998.6824.56
2023-05-08 13:5650.82388819.112418315.14.51.800.0580.3190.17920.78998.3722.78
2023-05-08 13:5550.81729219.114335258.910.24.400.040.6060.18621.38999.0422.15
2023-05-08 13:5450.81765719.11925226311.12.800.0270.3990.18522.84999.2620.24
2023-05-08 13:5350.81769519.12604264.95.62.200.0770.3950.18924.51999.1919.46
2023-05-08 13:5250.81700719.1292260.07.8200.0760.3320.18824.52999.5718.93
2023-05-08 13:5150.81172319.130872255.16.32.300.0540.980.19625.28999.5118.29
2023-05-08 13:5050.81186319.129823254.85.42.100.0690.3240.19125.42999.4417.82
2023-05-08 13:4850.81173519.123877272.75.72.100.0860.4520.20326.69998.6217.21
2023-05-08 13:4750.81183819.12062264.38.52.800.070.4090.20526.85998.5717.18
2023-05-08 13:3750.81145719.113898263.54.92.200.1170.4560.2419.33998.4824.41
2023-05-08 13:3150.80677819.103398273.55.52.300.2330.690.30516.54997.5329.27
2023-05-08 13:3050.80533319.103503271.77.9300.2530.6620.31916.56998.0328.75
2023-05-08 13:2950.80602719.103187270.97.12.300.30.8820.33717.09997.928.29
2023-05-08 13:2850.8084219.103825270.26.12.200.3550.9980.36817.37997.428.09
2023-05-08 13:2750.81074219.104067268.06.32.100.4040.7290.3717.69997.6126.86
2023-05-08 13:2650.81280819.104128266.65.41.800.5091.0330.40518.42997.4525.82
2023-05-08 13:2550.81703519.105248267.45.31.700.6870.8810.4419.13998.5725.4
2023-05-08 13:2450.8172719.112653269.54.81.400.9921.1180.45920.35998.9623.28
2023-05-08 13:2350.82079319.11131282.54.81.702.1721.680.50922.02998.5622.18
2023-05-08 13:2250.82216219.110895275.65.92.1014.2463.8340.6323.52998.3123.01
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Bobulski, J.; Szymoniak, S.; Pasternak, K. An IoT System for Air Pollution Monitoring with Safe Data Transmission. Sensors 2024, 24, 445. https://doi.org/10.3390/s24020445

AMA Style

Bobulski J, Szymoniak S, Pasternak K. An IoT System for Air Pollution Monitoring with Safe Data Transmission. Sensors. 2024; 24(2):445. https://doi.org/10.3390/s24020445

Chicago/Turabian Style

Bobulski, Janusz, Sabina Szymoniak, and Kamila Pasternak. 2024. "An IoT System for Air Pollution Monitoring with Safe Data Transmission" Sensors 24, no. 2: 445. https://doi.org/10.3390/s24020445

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop