Authors: Mohamed Dhiaeddine Messaoudi Bob-Antoine J. Menelas Hamid Mcheick
This research introduces an innovative smart cane architecture designed to empower visually impaired individuals. Integrating advanced sensors and social media connectivity, the smart cane enhances accessibility and encourages physical activity. Three meticulously developed algorithms ensure accurate step counting, swing detection, and proximity measurement. The smart cane’s architecture comprises the platform, communications, sensors, calculation, and user interface layers, providing comprehensive assistance for visually impaired individuals. Hardware components include an audio–tactile interaction module, input command module, microphone integration, local storage, step count module, cloud integration, and rechargeable battery. Software v1.9.7 components include Facebook Chat API integration, Python Facebook API integration, fbchat library integration, and Speech Recognition library integration. Overall, the proposed smart cane offers a comprehensive solution to enhance mobility, accessibility, and social engagement for visually impaired individuals. This study represents a significant stride toward a more inclusive society, leveraging technology to create meaningful impact in the lives of those with visual impairments. By fostering socialization and independence, our smart cane not only improves mobility but also enhances the overall well-being of the visually impaired community.
]]>Authors: Sheikh Muhammad Asher Iqbal Mary Ann Leavitt Imadeldin Mahgoub Waseem Asghar
Cardiovascular disease is one of the leading causes of death in the world. Heart failure is a cardiovascular disease in which the heart is unable to pump sufficient blood to fulfill the body’s requirements and can lead to fluid overload. Traditional solutions are not adequate to address the progression of heart failure. Herein, we report a body-mounted wearable sensor to monitor the parameters related to heart failure. These include heart rate, blood oxygen saturation, thoracic impedance, and activity status. The device is compact and wearable and measures the parameters continuously in real time. The device is an Internet of Things (IoT) device connected with a cloud-based database enabling the parameters to be visualized on a mobile application.
]]>Authors: Poornima Mahadevappa Redhwan Al-amri Gamal Alkawsi Ammar Alkahtani Mohammed Alghenaim Mohammed Alsamman
Edge data analytics refers to processing near data sources at the edge of the network to reduce delays in data transmission and, consequently, enable real-time interactions. However, data analytics at the edge introduces numerous security risks that can impact the data being processed. Thus, safeguarding sensitive data from being exposed to illegitimate users is crucial to avoiding uncertainties and maintaining the overall quality of the service offered. Most existing edge security models have considered attacks during data analysis as an afterthought. In this paper, an overview of edge data analytics in healthcare, traffic management, and smart city use cases is provided, including the possible attacks and their impacts on edge data analytics. Further, existing models are investigated to understand how these attacks are handled and research gaps are identified. Finally, research directions to enhance data analytics at the edge are presented.
]]>Authors: Pankaj Khatiwada Bian Yang Jia-Chun Lin Godfrey Mugurusi Stian Underbekken
Internet of Things (IoT) devices have changed how billions of people in the world connect and interact with each other. But, as more people use IoT devices, many questions arise about how these devices handle private data and whether they properly ask for permission when using it. Due to information privacy regulations such as the EU’s General Data Protection Regulation (GDPR), which requires companies to seek permission from data subjects (DS) before using their data, it is crucial for IoT companies to obtain this permission correctly. However, this can be really challenging in the IoT world because people often find it difficult to interact with and manage multiple IoT devices under their control. Also, the rules about privacy are not always clear. As such, this paper proposes a new model to improve how consent is managed in the world of IoT. The model seeks to minimize “consent fatigue” (when people get tired of always being asked for permission) and give DS more control over how their data are shared. This includes having default permission settings, being able to compare similar devices, and, in the future, using AI to give personalized advice. The model allows users to easily review and change their IoT device permissions if previous conditions are not met. It also emphasizes the need for easily understandable privacy rules, clear communication with users, and robust tracking of consent for data usage. By using this model, companies that provide IoT services can do a better job of protecting user privacy and managing DS consent. In addition, companies can more easily comply with data protection laws and build stronger relationships with their customers.
]]>Authors: Paniti Netinant Thitipong Utsanok Meennapa Rukhiran Suttipong Klongdee
With the rapid rise of digitalization in the global economy, home security systems have become increasingly important for personal comfort and property protection. The collaboration between humans, the Internet of Things (IoT), and smart homes can be highly efficient. Interaction considers convenience, efficiency, security, responsiveness, and automation. This study aims to develop and assess IoT-based home security systems utilizing passive infrared (PIR) sensors to improve user interface, security, and automation controls using voice commands and buttons across different communication protocols. The proposed system incorporates controls for lighting and intrusion monitoring, as well as assessing both the functionality of voice commands and the precision of intruder detection via the PIR sensors. Intelligent light control and PIR intruder detection with a variable delay time for response detection are unified into the research methodology. The test outcomes examine the average effective response time in-depth, revealing performance distinctions among wireless fidelity (Wi-Fi) and fourth- and fifth-generation mobile connections. The outcomes illustrate the reliability of voice-activated light control via Google Assistant, with response accuracy rates of 83 percent for Thai voice commands and 91.50 percent for English voice commands. Moreover, the Blynk mobile application provided exceptional precision regarding operating light-button commands. The PIR motion detectors have a one hundred percent detection accuracy, and a 2.5 s delay is advised for PIR detection. Extended PIR detection delays result in prolonged system response times. This study examines the intricacies of response times across various environmental conditions, considering different degrees of mobile communication quality. This study ultimately advances the field by developing an IoT system prepared for efficient integration into everyday life, holding the potential to provide improved convenience, time-saving effectiveness, cost-efficiency, and enhanced home security protocols.
]]>Authors: Sairoel Amertet Finecomess Girma Gebresenbet Hassan Mohammed Alwan
In an agricultural system, finding suitable watering, pesticides, and soil content to provide the right nutrients for the right plant remains challenging. Plants cannot speak and cannot ask for the food they require. These problems can be addressed by applying intelligent (fuzzy logic) controllers to IoT devices in order to enhance communication between crops, ground mobile robots, aerial robots, and the entire farm system. The application of fuzzy logic in agriculture is a promising technology that can be used to optimize crop yields and reduce water usage. It was developed based on language and the air properties in agricultural fields. The entire system was simulated in the MATLAB/SIMULINK environment with Cisco Packet Tracer integration. The inputs for the system were soil moisture sensors, temperature sensors, and humidity sensors, and the outputs were pump flow, valve opening, water level, and moisture in the sounding. The obtained results were the output of the valve opening, moisture in the sounding, pump flow rate, outflow, water level, and ADH values, which are 10.00000013 rad/s, 34.72%, 4.494%, 0.025 m3/s, 73.31 cm3, and 750 values, respectively. The outflow rate increase indicates that water is being released from the tanks, and the control signal fluctuates, indicating that the valve is opening.
]]>Authors: Carlo Impagliazzo Muriel Cabianca Maria Laura Clemente Giuliana Siddi Moreau Matteo Vocale Lidia Leoni
This paper describes the development activity that has been carried out for a living laboratory for the city of Cagliari aimed at functioning as a learning center for local SMEs willing to improve their skills in IoT and create applications that will be integrated in an open innovation ecosystem. The many users belonging to the various SMEs involved in the project required an ICT laboratory with a platform that could manage them and provide a multi-tenant environment for the development of IoT applications. The architecture also had to be scalable and interoperable, and the resulting platform had to collect many kinds of data from sensors or other data sources, elaborate them, and show georeferenced information on a 3D satellite interactive view along with statistics on side panels. This work was based on a platform already developed by CRS4 for a previous project. Preserving the concept of the decision-making tool for Smart Cities, almost every component was redesigned, and, in this paper, we describe the new solutions that have been implemented. Starting from the former structure, further features were added in a novel way in order to offer an enhanced framework that can deal with the activities of the laboratory, exploiting the scalability of the open-source systems involved, their robustness and flexibility, and leveraging domain standards. In this article, the main challenges involved in the development of the platform are described, as well as the solutions that have been implemented so far.
]]>Authors: Ali Eghmazi Mohammadhossein Ataei René Jr Landry Guy Chevrette
The Internet of Things (IoT) is a technology that can connect billions of devices or “things” to other devices (machine to machine) or even to people via an existing infrastructure. IoT applications in real-world scenarios include smart cities, smart houses, connected appliances, shipping, monitoring, smart supply chain management, and smart grids. As the number of devices all over the world is increasing (in all aspects of daily life), huge amounts of data are being produced as a result. New issues are therefore arising from the use and development of current technologies, regarding new applications, regulation, cloud computing, security, and privacy. The blockchain has shown promise in terms of securing and preserving the privacy of users and data, in a decentralized manner. In particular, Hyperledger Fabric v2.x is a new generation of blockchain that is open source and offers versatility, modularity, and performance. In this paper, a blockchain as a service (BaaS) application based on Hyperledger Fabric is presented to address the security and privacy challenges associated with the IoT. A new architecture is introduced to enable this integration, and is developed and deployed, and its performance is analyzed in real-world scenarios. We also propose a new data structure with encryption based on public and private keys for enhanced security and privacy.
]]>Authors: Mona Alkanhal Abdulaziz Alali Mohamed Younis
In recent times, the advent of innovative technological paradigms like the Internet of Things has paved the way for numerous applications that enhance the quality of human life. A remarkable application of IoT that has emerged is the Internet of Vehicles (IoV), motivated by an unparalleled surge of connected vehicles on the roads. IoV has become an area of significant interest due to its potential in enhancing traffic safety as well as providing accurate routing information. The primary objective of IoV is to maintain strict latency standards while ensuring confidentiality and security. Given the high mobility and limited bandwidth, vehicles need to have rapid and frequent authentication. Securing Vehicle-to-Roadside unit (V2R) and Vehicle-to-Vehicle (V2V) communications in IoV is essential for preventing critical information leakage to an adversary or unauthenticated users. To address these challenges, this paper proposes a novel mutual authentication protocol which incorporates hardware-based security primitives, namely physically unclonable functions (PUFs) with Multi-Input Multi-Output (MIMO) physical layer communications. The protocol allows a V2V and V2R to mutually authenticate each other without the involvement of a trusted third-party (server). The protocol design effectively mitigates modeling attacks and impersonation attempts, where the accuracy of predicting the value of each PUF response bit does not exceed 54%, which is equivalent to a random guess.
]]>Authors: Alexander Solovyev Ivan Tarkhanov
The article discusses the modeling of the use of digital twin technologies (a digital twin) for the task of organizing long-term storage of various types of documents. A digital twin in this respect differs from a digital copy, which has no connection with the real original object. A review of the problem was carried out. We argue that, despite the active use of digital twin technology in various areas, its applications in the area of long-term storage of documents remain limited. At the same time, the task of increasing the durability of documents during long-term storage remains important and largely unresolved. The complexity of solving the problem of long-term storage of documents is considered, and a formal statement of the problem of long-term storage using digital twin technologies is carried out. Destructive factors that affect long-term storage documents and significantly reduce their durability have been identified. A system of indicators has been developed to assess the durability (preservation) of documents. The modeling of the use of digital twin technology in the organization of long-term preservation within the framework of Industry 4.0 was carried out. In the course of modeling, the goals and the strategies of long-term storage were established. Primary mathematical models for controlling destructive factors as well as technological solutions for digital twin long-term storage are proposed. It is assumed that the key part of this technology is the Industrial Internet of Things. The effectiveness of the use of digital twin technologies for solving the problem was assessed. The spheres of application and further ways of research are determined.
]]>Authors: Juhani Latvakoski Vesa Kyllönen Jussi Ronkainen
The novel contribution of this research is decentralised IOTA-based concepts of digital trust for securing remote driving in an urban environment. The conceptual solutions are studied and described, and respective experimental solutions are developed relying on digital identities, public key cryptography with a decentralised approach using decentralised identifiers (DIDs) and verifiable credentials (VCs), and an IOTA-based distributed ledger. The provided digital trust solutions were validated by executing them according to the remote driving scenario but with a simulated vehicle and simulated remote driving system. The hybrid simulation mainly focused on the validation of functional, causal temporal correctness, feasibility, and capabilities of the provided solutions. The evaluations indicate that the concepts of digital trust fulfil the purpose and contribute towards making remote driving more trustable. A supervisory stakeholder was used as a verifier, requiring a set of example verifiable credentials from the vehicle and the remote driver, and accepting them to the security control channel. The separation of control and data planes from each other was found to be a good solution because the delays caused by required security control can be limited to the initiation of the remote driving session without causing additional delays in the actual real-time remote driving control data flow. The application of the IOTA Tangle as the verifiable data registry was found to be sufficient for security control purposes. During the evaluations, the need for further studies related to scalability, application of wallets, dynamic trust situations, time-sensitive behaviour, and autonomous operations, as well as smart contract(s) between multiple stakeholders, were detected. As the next step of this research, the provided digital trust solutions will be integrated with a vehicle, remote driving system and traffic infrastructure for evaluation of the performance, reliability, scalability, and flexibility in real-world experiments of remote driving of an electric bus in an urban environment.
]]>Authors: Tareq Khan
Fires kill and injure people, destroy residences, pollute the air, and cause economic loss. The damage of the fire can be reduced if we can detect the fire early and notify the firefighters as soon as possible. In this project, a novel Internet of Things (IoT)-based fire detector device is developed that automatically detects a fire, recognizes the object that is burning, finds out the class of fire extinguisher needed, and then sends notifications with location information to the user and the emergency responders smartphones within a second. This will help firefighters to arrive quickly with the correct fire extinguisher—thus, the spread of fire can be reduced. The device detects fire using a thermal camera and common objects using a red-green-blue (RGB) camera with a deep-learning-based algorithm. When a fire is detected, the device sends data using the Internet to a central server, and it then sends notifications to the smartphone apps. No smoke detector or fire alarm is available in the literature that can automatically suggest the class of fire extinguisher needed, and this research fills this gap. Prototypes of the fire detector device, the central server for the emergency responder’s station, and smartphone apps have been developed and tested successfully.
]]>Authors: Meghana Thiyyakat Subramaniam Kalambur Dinkar Sitaram
The use of data centers is ubiquitous, as they support multiple technologies across domains for storing, processing, and disseminating data. IoT applications utilize both cloud data centers and edge data centers based on the nature of the workload. Due to the stringent latency requirements of IoT applications, the workloads are run on hardware accelerators such as FPGAs and GPUs for faster execution. The introduction of such hardware alongside existing variations in the hardware and software configurations of the machines in the data center, increases the heterogeneity of the infrastructure. Optimal job performance necessitates the satisfaction of task placement constraints. This is accomplished through constraint-aware scheduling, where tasks are scheduled on worker nodes with appropriate machine configurations. The presence of placement constraints limits the number of suitable resources available to run a task, leading to queuing delays. As federated schedulers have gained prominence for their speed and scalability, we assess the performance of two such schedulers, Megha and Pigeon, within a constraint-aware context. We extend our previous work on Megha by comparing its performance with a constraint-aware version of the state-of-the-art federated scheduler Pigeon, PigeonC. The results of our experiments with synthetic and real-world cluster traces show that Megha reduces the 99th percentile of job response time delays by a factor of 10 when compared to PigeonC. We also describe enhancements made to Megha’s architecture to improve its scheduling efficiency.
]]>Authors: Ilias Zosimadis Ioannis Stamelos
Bowling is a target sport that is popular among all age groups with professionals and amateur players. Delivering an accurate and consistent bowling throw into the lane requires the incorporation of motion techniques. Consequently, this research presents a novel IoT Cloud-based system for providing real-time monitoring and coaching services to bowling athletes. The system includes two inertial measurement units (IMUs) sensors for capturing motion data, a mobile application, and a Cloud server for processing the data. First, the quality of each phase of a throw is assessed using a Dynamic Time Warping (DTW)-based algorithm. Second, an on-device-level technique is proposed to identify common bowling errors. Finally, an SVM classification model is employed for assessing the skill level of bowler athletes. We recruited nine right-handed bowlers to perform 50 throws wearing the two sensors and using the proposed system. The results of our experiments suggest that the proposed system can effectively and efficiently assess the quality of the throw, detect common bowling errors, and classify the skill level of the bowler.
]]>Authors: Arun A. Ravindran
The falling cost of IoT cameras, the advancement of AI-based computer vision algorithms, and powerful hardware accelerators for deep learning have enabled the widespread deployment of surveillance cameras with the ability to automatically analyze streaming video feeds to detect events of interest. While streaming video analytics is currently largely performed in the cloud, edge computing has emerged as a pivotal component due to its advantages of low latency, reduced bandwidth, and enhanced privacy. However, a distinct gap persists between state-of-the-art computer vision algorithms and the successful practical implementation of edge-based streaming video analytics systems. This paper presents a comprehensive review of more than 30 research papers published over the last 6 years on IoT edge streaming video analytics (IE-SVA) systems. The papers are analyzed across 17 distinct dimensions. Unlike prior reviews, we examine each system holistically, identifying their strengths and weaknesses in diverse implementations. Our findings suggest that certain critical topics necessary for the practical realization of IE-SVA systems are not sufficiently addressed in current research. Based on these observations, we propose research trajectories across short-, medium-, and long-term horizons. Additionally, we explore trending topics in other computing areas that can significantly impact the evolution of IE-SVA systems.
]]>Authors: Bimal Kumar Roy Anandarup Roy
Secret sharing schemes are widely used to protect data by breaking the secret into pieces and sharing them amongst various members of a party. In this paper, our objective is to produce a repairable ramp scheme that allows for the retrieval of a share through a collection of members in the event of its loss. Repairable Threshold Schemes (RTSs) can be used in cloud storage and General Data Protection Regulation (GDPR) protocols. Secure and energy-efficient data transfer in sensor-based IoTs is built using ramp-type schemes. Protecting personal privacy and reinforcing the security of electronic identification (eID) cards can be achieved using similar schemes. Desmedt et al. introduced the concept of frameproofness in 2021, which motivated us to further improve our construction with respect to this framework. We introduce a graph theoretic approach to the design for a well-rounded and easy presentation of the idea and clarity of our results. We also highlight the importance of secret sharing schemes for IoT applications, as they distribute the secret amongst several devices. Secret sharing schemes offer superior security in lightweight IoT compared to symmetric key encryption or AE schemes because they do not disclose the entire secret to a single device, but rather distribute it among several devices.
]]>Authors: Raafat George Saadé Jun Zhang Xiaoyong Wang Hao Liu Hong Guan
The application of the Internet of Things is increasing in momentum as advances in artificial intelligence exponentially increase its integration. This has caused continuous shifts in the Internet of Things paradigm with increasing levels of complexity. Consequently, researchers, practitioners, and governments continue facing evolving challenges, making it more difficult to adapt. This is especially true in the education sector, which is the focus of this article. The overall purpose of this study is to explore the application of IoT and artificial intelligence in education and, more specifically, learning. Our methodology follows four research questions. We first report the results of a systematic literature review on the Internet of Intelligence of Things (IoIT) in education. Secondly, we develop a corresponding conceptual model, followed thirdly by an exploratory pilot survey conducted on a group of educators from around the world to get insights on their knowledge and use of the Internet of Things in their classroom, thereby providing a better understanding of issues, such as knowledge, use, and their readiness to integrate IoIT. We finally present the application of the IoITE conceptual model in teaching and learning through four use cases. Our review of publications shows that research in the IoITE is scarce. This is even more so if we consider its application to learning. Analysis of the survey results finds that educators, in general, are lacking in their readiness to innovate with the Internet of Things in learning. Use cases highlight IoITE possibilities and its potential to explore and exploit. Challenges are identified and discussed.
]]>Authors: Rameez Asif Syed Raheel Hassan
The Internet of Things (IoT) and the metaverse are two rapidly evolving technologies that have the potential to shape the future of our digital world. IoT refers to the network of physical devices, vehicles, buildings, and other objects that are connected to the internet and capable of collecting and sharing data. The metaverse, on the other hand, is a virtual world where users can interact with each other and digital objects in real time. In this research paper, we aim to explore the intersection of the IoT and metaverse and the opportunities and challenges that arise from their convergence. We will examine how IoT devices can be integrated into the metaverse to create new and immersive experiences for users. We will also analyse the potential use cases and applications of this technology in various industries such as healthcare, education, and entertainment. Additionally, we will discuss the privacy, security, and ethical concerns that arise from the use of IoT devices in the metaverse. A survey is conducted through a combination of a literature review and a case study analysis. This review will provide insights into the potential impact of IoT and metaverse on society and inform the development of future technologies in this field.
]]>Authors: Ahmed Hassebo Mohamed Tealab
As the world becomes increasingly urbanized, the development of smart cities and the deployment of IoT applications will play an essential role in addressing urban challenges and shaping sustainable and resilient urban environments. However, there are also challenges to overcome, including privacy and security concerns, and interoperability issues. Addressing these challenges requires collaboration between governments, industry stakeholders, and citizens to ensure the responsible and equitable implementation of IoT technologies in smart cities. The IoT offers a vast array of possibilities for smart city applications, enabling the integration of various devices, sensors, and networks to collect and analyze data in real time. These applications span across different sectors, including transportation, energy management, waste management, public safety, healthcare, and more. By leveraging IoT technologies, cities can optimize their infrastructure, enhance resource allocation, and improve the quality of life for their citizens. In this paper, eight smart city global models have been proposed to guide the development and implementation of IoT applications in smart cities. These models provide frameworks and standards for city planners and stakeholders to design and deploy IoT solutions effectively. We provide a detailed evaluation of these models based on nine smart city evaluation metrics. The challenges to implement smart cities have been mentioned, and recommendations have been stated to overcome these challenges.
]]>Authors: Khaled A. Alaghbari Heng-Siong Lim Mohamad Hanif Md Saad Yik Seng Yong
The intrusion detection system (IDS) is a promising technology for ensuring security against cyber-attacks in internet-of-things networks. In conventional IDS, anomaly detection and feature extraction are performed by two different models. In this paper, we propose a new integrated model based on deep autoencoder (AE) for anomaly detection and feature extraction. Firstly, AE is trained based on normal network traffic and used later to detect anomalies. Then, the trained AE model is employed again to extract useful low-dimensional features for anomalous data without the need for a feature extraction training stage, which is required by other methods such as principal components analysis (PCA) and linear discriminant analysis (LDA). After that, the extracted features are used by a machine learning (ML) or deep learning (DL) classifier to determine the type of attack (multi-classification). The performance of the proposed unified approach was evaluated on real IoT datasets called N-BaIoT and MQTTset, which contain normal and malicious network traffics. The proposed AE was compared with other popular anomaly detection techniques such as one-class support vector machine (OC-SVM) and isolation forest (iForest), in terms of performance metrics (accuracy, precision, recall, and F1-score), and execution time. AE was found to identify attacks better than OC-SVM and iForest with fast detection time. The proposed feature extraction method aims to reduce the computation complexity while maintaining the performance metrics of the multi-classifier models as much as possible compared to their counterparts. We tested the model with different ML/DL classifiers such as decision tree, random forest, deep neural network (DNN), conventional neural network (CNN), and hybrid CNN with long short-term memory (LSTM). The experiment results showed the capability of the proposed model to simultaneously detect anomalous events and reduce the dimensionality of the data.
]]>Authors: Yanhua Pei Fen Hou Guoying Zhang Bin Lin
With the high flexibility and low cost of the deployment of UAVs, the application of UAV-assisted data collection has become widespread in the Internet of Things (IoT) systems. Meanwhile, the age of information (AoI) has been adopted as a key metric to evaluate the quality of the collected data. Most of the literature generally focuses on minimizing the age of all information. However, minimizing the overall AoI may lead to high costs and massive energy consumption. In addition, not all types of data need to be updated highly frequently. In this paper, we consider both the diversity of different tasks in terms of the data update period and the AoI of the collected sensing information. An efficient data collection method is proposed to maximize the system utility while ensuring the freshness of the collected information relative to their respective update periods. This problem is NP-hard. With the decomposition, we optimize the upload strategy of sensor nodes at each time slot, as well as the hovering positions and flight speeds of UAVs. Simulation results show that our method ensures the relative freshness of all information and reduces the time-averaged AoI by 96.5%, 44%, 90.4%, and 26% when the number of UAVs is 1 compared to the corresponding EMA, AOA, DROA, and DRL-eFresh, respectively.
]]>Authors: Emmanuel Effah Ousmane Thiare Alexander M. Wyglinski
This paper presents an in-depth contextualized tutorial on Agricultural IoT (Agri-IoT), covering the fundamental concepts, assessment of routing architectures and protocols, and performance optimization techniques via a systematic survey and synthesis of the related literature. The negative impacts of climate change and the increasing global population on food security and unemployment threats have motivated the adoption of the wireless sensor network (WSN)-based Agri-IoT as an indispensable underlying technology in precision agriculture and greenhouses to improve food production capacities and quality. However, most related Agri-IoT testbed solutions have failed to achieve their performance expectations due to the lack of an in-depth and contextualized reference tutorial that provides a holistic overview of communication technologies, routing architectures, and performance optimization modalities based on users’ expectations. Thus, although IoT applications are founded on a common idea, each use case (e.g., Agri-IoT) varies based on the specific performance and user expectations as well as technological, architectural, and deployment requirements. Likewise, the agricultural setting is a unique and hostile area where conventional IoT technologies do not apply, hence the need for this tutorial. Consequently, this tutorial addresses these via the following contributions: (1) a systematic overview of the fundamental concepts, technologies, and architectural standards of WSN-based Agri-IoT, (2) an evaluation of the technical design requirements of a robust, location-independent, and affordable Agri-IoT, (3) a comprehensive survey of the benchmarking fault-tolerance techniques, communication standards, routing and medium access control (MAC) protocols, and WSN-based Agri-IoT testbed solutions, and (4) an in-depth case study on how to design a self-healing, energy-efficient, affordable, adaptive, stable, autonomous, and cluster-based WSN-specific Agri-IoT from a proposed taxonomy of multi-objective optimization (MOO) metrics that can guarantee an optimized network performance. Furthermore, this tutorial established new taxonomies of faults, architectural layers, and MOO metrics for cluster-based Agri-IoT (CA-IoT) networks and a three-tier objective framework with remedial measures for designing an efficient associated supervisory protocol for cluster-based Agri-IoT networks.
]]>Authors: Jens Kneifel Robin Roj Hans-Bernhard Woyand Ralf Theiß Peter Dültgen
This publication presents the development of an Industrial-Internet-of-Things device. The device is capable of completing several tasks, such as the acquisition of high-frequency measurement data and evaluating data via machine learning methods in an artificial intelligence application. The installed measurement technology generates data which is comparable to data generated by costly laboratory equipment, meaning that it can be used as a low-budget and open-source alternative. A workflow method has been designed that promotes experimental work and simplifies the effort required to implement artificial intelligence solutions. At the end of this paper, the results of the experiment, which aimed to collect measurement data, extract suitable features, and train artificial intelligence models, are presented. Techniques from vibration analysis were used for feature extraction, and concepts for the extrapolation and enhancement of data sets were investigated. The test results have proven that the development is comparable with high-end laboratory equipment. The created application has demonstrated sufficient accuracy in predictions, and the designed process can be used for arbitrary, artificial intelligence-based rapid prototyping.
]]>Authors: Gilroy P. Pereira Mohamed Z. Chaari Fawwad Daroge
Agriculture, or farming, is the science of cultivating the soil, growing crops, and raising livestock. Ever since the days of the first plow from sticks over ten thousand years ago, agriculture has always depended on technology. As technology and science improved, so did the scale at which farming was possible. With the popularity and growth of the Internet of Things (IoT) in recent years, there are even more avenues for technology to make agriculture more efficient and help farmers in every nation. In this paper, we designed a smart IoT-enabled drip irrigation system using ESP32 to automate the irrigation process, and we tested it. The ESP32 communicates with the Blynk app, which is used to collect irrigation data, manually water the plants, switch off the automatic watering function, and plot graphs based on the readings of the sensors. We connected the ESP32 to a soil moisture sensor, temperature sensor, air humidity sensor, and water flow sensor. The ESP32 regularly checks if the soil is dry. If the soil is dry and the soil temperature is appropriate for watering, the ESP32 opens a solenoid valve and waters the plants. The amount of time to run the drip irrigation system is determined based on the flow rate measured by the water flow sensor. The ESP32 reads the humidity sensor values and notifies the user when the humidity is too high or too low. The user can switch off the automatic watering system according to the humidity value. In both primary and field tests, we found that the system ran well and was able to grow green onions.
]]>Authors: Mithila Farjana Abu Bakar Fahad Syed Eftasum Alam Md. Motaharul Islam
IoT-based smart e-waste management is an emerging field that combines technology and environmental sustainability. E-waste is a growing problem worldwide, as discarded electronics can have negative impacts on the environment and public health. In this paper, we have proposed a smart e-waste management system. This system uses IoT devices and sensors to monitor and manage the collection, sorting, and disposal of e-waste. The IoT devices in this system are typically embedded with sensors that can detect and monitor the amount of e-waste in a given area. These sensors can provide real-time data on e-waste, which can then be used to optimize collection and disposal processes. E-waste is like an asset to us in most cases; as it is recyclable, using it in an efficient manner would be a perk. By employing machine learning to distinguish e-waste, we can contribute to separating metallic and plastic components, the utilization of pyrolysis to transform plastic waste into bio-fuel, coupled with the generation of bio-char as a by-product, and the repurposing of metallic portions for the development of solar batteries. We can optimize its use and also minimize its environmental impact; it presents a promising avenue for sustainable waste management and resource recovery. Our proposed system also uses cloud-based platforms to help analyze patterns and trends in the data. The Autoregressive Integrated Moving Average, a statistical method used in the cloud, can provide insights into future garbage levels, which can be useful for optimizing waste collection schedules and improving the overall process.
]]>Authors: Shensheng Tang
A fog-based IoT platform model involving three layers, i.e., IoT devices, fog nodes, and the cloud, was proposed using an open Jackson network with feedback. The system performance was analyzed for individual subsystems, and the overall system was based on different input parameters. Interesting performance metrics were derived from analytical results. A resource optimization problem was developed and solved to determine the optimal service rates at individual fog nodes under some constraint conditions. Numerical evaluations for the performance and the optimization problem are provided for further understanding of the analysis. The modeling and analysis, as well as the optimization design method, are expected to provide a useful reference for the design and evaluation of fog computing systems.
]]>Authors: Abasi-amefon Obot Affia Hilary Finch Woosub Jung Issah Abubakari Samori Lucas Potter Xavier-Lewis Palmer
The concept of the Internet of Things (IoT) spans decades, and the same can be said for its inclusion in healthcare. The IoT is an attractive target in medicine; it offers considerable potential in expanding care. However, the application of the IoT in healthcare is fraught with an array of challenges, and also, through it, numerous vulnerabilities that translate to wider attack surfaces and deeper degrees of damage possible to both consumers and their confidence within health systems, as a result of patient-specific data being available to access. Further, when IoT health devices (IoTHDs) are developed, a diverse range of attacks are possible. To understand the risks in this new landscape, it is important to understand the architecture of IoTHDs, operations, and the social dynamics that may govern their interactions. This paper aims to document and create a map regarding IoTHDs, lay the groundwork for better understanding security risks in emerging IoTHD modalities through a multi-layer approach, and suggest means for improved governance and interaction. We also discuss technological innovations expected to set the stage for novel exploits leading into the middle and latter parts of the 21st century.
]]>Authors: Indranil Roy Reshmi Mitra Nick Rahimi Bidyut Gupta
Cloud-computing capabilities have revolutionized the remote processing of exploding volumes of healthcare data. However, cloud-based analytics capabilities are saddled with a lack of context-awareness and unnecessary access latency issues as data are processed and stored in remote servers. The emerging network infrastructure tier of fog computing can reduce expensive latency by bringing storage, processing, and networking closer to sensor nodes. Due to the growing variety of medical data and service types, there is a crucial need for efficient and secure architecture for sensor-based health-monitoring devices connected to fog nodes. In this paper, we present publish/subscribe and interest/resource-based non-DHT-based peer-to-peer (P2P) RC-based architecture for resource discovery. The publish/subscribe communication model provides a scalable way to handle large volumes of data and messages in real time, while allowing fine-grained access control to messages, thus enabling heightened security. Our two − level overlay network consists of (1) a transit ring containing group-heads representing a particular resource type, and (2) a completely connected group of peers. Our theoretical analysis shows that our search latency is independent of the number of peers. Additionally, the complexity of the intra-group data-lookup protocol is constant, and the complexity of the inter-group data lookup is O(n), where n is the total number of resource types present in the network. Overall, it therefore allows the system to handle large data throughput in a flexible, cost-effective, and secure way for medical IoT systems.
]]>Authors: Saad Inshi Rasel Chowdhury Hakima Ould-Slimane Chamseddine Talhi
Predicting context-aware activities using machine-learning techniques is evolving to become more readily available as a major driver of the growth of IoT applications to match the needs of the future smart autonomous environments. However, with today’s increasing security risks in the emerging cloud technologies, which share massive data capabilities and impose regulation requirements on privacy, as well as the emergence of new multiuser, multiprofile, and multidevice technologies, there is a growing need for new approaches to address the new challenges of autonomous context awareness and its fine-grained security-enforcement models. The solutions proposed in this work aim to extend our previous LCA-ABE work to provide an intelligent, dynamic creation of context-aware policies, which has been achieved through deploying smart-learning techniques. It also provides data consent, automated access control, and secure end-to-end communications by leveraging attribute-based encryption (ABE). Moreover, our policy-driven orchestration model is able to achieve an efficient, real-time enforcement of authentication and authorization (AA) as well as federation services between users, service providers, and connected devices by aggregating, modelling, and reasoning context information and then updating consent accordingly in autonomous ways. Furthermore, our framework ensures that the accuracy of our algorithms is above 90% and their precision is around 85%, which is considerably high compared to the other reviewed approaches. Finally, the solution fulfills the newly imposed privacy regulations and leverages the full power of IoT smart environments.
]]>Authors: Qiwen Tian Sumiko Miyata
To detect each network attack in an SDN environment, an attack detection method is proposed based on an analysis of the features of the attack and the change in entropy of each parameter. Entropy is a parameter used in information theory to express a certain degree of order. However, with the increasing complexity of networks and the diversity of attack types, existing studies use a single entropy, which does not discriminate correctly between attacks and normal traffic and may lead to false positives. In this paper, we propose new state determination standards that use the normal distribution characteristics of the entropy value at the time which an attack did not occur, subdivide the normal and abnormal range represented by the entropy value, improving the accuracy of attack determination. Furthermore, we show the effectiveness of the proposed method by numerical analysis.
]]>Authors: Majid Nasirinejad Srinivas Sampalli
Home appliance manufacturers have been adding Wi-Fi modules and sensors to devices to make them ‘smart’ since the early 2010s. However, consumers are still largely unaware of what kind of sensors are used in these devices. In fact, they usually do not even realize that smart devices require an interaction of hardware and software since the smart device software is not immediately apparent. In this paper, we explore how providing additional information on these misunderstood smart device features (such as lists of sensors, software updates, and warranties) can influence consumers’ purchase decisions. We analyze how additional information on software update warranty (SUW) and the type of sensors in smart devices (which draw attention to potential financial and privacy risks) mediates consumer purchase behavior. We also examine how other moderators, such as brand trust and product price, affect consumers’ purchase decisions when considering which smart product option to buy. In the first qualitative user study, we conducted interviews with 20 study participants, and the results show that providing additional information about software updates and lists of sensors had a significant impact on consumer purchase preference. In our second quantitative study, we surveyed 323 participants to determine consumers’ willingness to pay for a SUW. From this, we saw that users were more willing to pay for Lifetime SUW on a smart TV than to pay for a 5-year SUW. These results provide important information to smart device manufacturers and designers on elements that improve trust in their brand, thus increasing the likelihood that consumers will purchase their smart devices. Furthermore, addressing the general consumer smart device knowledge gap by providing this relevant information could lead to a significant increase in consumer adoption of smart products overall, which would benefit the industry as a whole.
]]>Authors: Sanjeev Shakya Attaphongse Taparugssanagorn Chaklam Silpasuwanchai
Gait analysis is a powerful technique that detects and identifies foot disorders and walking irregularities, including pronation, supination, and unstable foot movements. Early detection can help prevent injuries, correct walking posture, and avoid the need for surgery or cortisone injections. Traditional gait analysis methods are expensive and only available in laboratory settings, but new wearable technologies such as AI and IoT-based devices, smart shoes, and insoles have the potential to make gait analysis more accessible, especially for people who cannot easily access specialized facilities. This research proposes a novel approach using IoT, edge computing, and tiny machine learning (TinyML) to predict gait patterns using a microcontroller-based device worn on a shoe. The device uses an inertial measurement unit (IMU) sensor and a TinyML model on an advanced RISC machines (ARM) chip to classify and predict abnormal gait patterns, providing a more accessible, cost-effective, and portable way to conduct gait analysis.
]]>Authors: IoT IoT Editorial Office
High-quality academic publishing is built on rigorous peer review [...]
]]>Authors: Mazen Juma Fuad Alattar Basim Touqan
The smart manufacturing ecosystem enhances the end-to-end efficiency of the mine-to-market lifecycle to create the value chain using the big data generated rapidly by edge computing devices, third-party technologies, and various stakeholders connected via the industrial Internet of things. In this context, smart manufacturing faces two serious challenges to its industrial IoT big data integrity: real-time transaction monitoring and peer validation due to the volume and velocity dimensions of big data in industrial IoT infrastructures. Modern blockchain technologies as an embedded layer substantially address these challenges to empower the capabilities of the IIoT layer to meet the integrity requirements of the big data layer. This paper presents the trusted consortium blockchain (TCB) framework to provide an optimal solution for big data integrity through a secure and verifiable hyperledger fabric modular (HFM). The TCB leverages trustworthiness in heterogeneous IIoT networks of governing end-point peers to achieve strong integrity for big data and support high transaction throughput and low latency of HFM contents. Our proposed framework drives the fault-tolerant properties and consensus protocols to monitor malicious activities of tunable peers if compromised and validates the signed evidence of big data recorded in real-time HFM operated over different smart manufacturing environments. Experimentally, the TCB has been evaluated and reached tradeoff results of throughput and latency better than the comparative consortium blockchain frameworks.
]]>Authors: Tareq Khan
Wildfires kill and injure people, destroy residences, pollute the air, and cause economic loss. In this paper, a low-power Internet of Things (IoT)-based sensor network is developed, which automatically detects fires in forests and sends the location to a central monitoring station with smartphone notifications in a real-time setting. This action helps in the early detection of a fire and firefighters can be notified immediately—thus the spread of the fire and the harm caused by it can be reduced. The proposed system detects fires from the presence of smoke and a sudden increase in temperature. The system also logs the temperature, humidity, carbon dioxide, rain, light, and wind speed in different areas of the forest. The sensor nodes transmit the data to a hub using a long-range wireless transmitter and the hub then sends the data to the central monitoring station using the cellular Internet. The sensor nodes and hub are designed with ultra-low-power hardware and software architecture, consuming current of only 0.37 and 1.4 mA, respectively, so that they can be powered by solar panels throughout the year. The central server and smartphone app contain maps, and the wildfire locations are marked in the case of a fire. In the present study, a prototype of the proposed system is successfully developed and tested.
]]>Authors: Marc Ladegourdie Jonathan Kua
Open Platform Communications Unified Architecture (OPC UA) incorporates a wide range of features and covers most of the requirements for a platform-independent interoperability standard which can be used to transmit data and information from the factory production floor to the enterprise and management level. Due to its highly scalable and interoperable architecture, it is well-positioned for future deployment in smart embedded devices towards Industry 4.0, especially in environments where there are heterogeneous communication nodes. In this paper, we aim to evaluate the performance of OPC UA for communication in Industrial Internet of Things (IIoT) environments to better understand the technical implementation of OPC UA and the feasibility of incorporating OPC UA directly to resource-constrained edge devices. We propose an architectural system framework for OPC UA performance evaluation across a wide range of experiments. Our experimental results demonstrated the efficacy of the proposed system and evaluation framework. The OPC UA-based IIoT system architecture and budget-friendly/cost-effective testbed setup can be flexibly adopted for protocol testing, prototyping and educational purposes.
]]>Authors: Aggeliki Sgora Periklis Chatzimisios
With the proliferation of multimedia services, Quality of Experience (QoE) has gained a lot of attention. QoE ties together the users’ needs and expectations to multimedia application and network performance. However, in various Internet of Things (IoT) applications such as healthcare, surveillance systems, traffic monitoring, etc., human feedback can be limited or infeasible. Moreover, for immersive augmented and virtual reality, as well as other mulsemedia applications, the evaluation in terms of quality cannot only focus on the sight and hearing senses. Therefore, the traditional QoE definition and approaches for evaluating multimedia services might not be suitable for the IoT paradigm, and more quality metrics are required in order to evaluate the quality in IoT. In this paper, we review existing quality definitions, quality influence factors (IFs) and assessment approaches for IoT. This paper also introduces challenges in the area of quality assessment for the IoT paradigm.
]]>Authors: Amanjot Kaur Shashi Shekhar Jha Jiong Jin Hadi Ghaderi
The use of unmanned aerial vehicles (UAV) as an integrated sensing and communication platform is emerging for surveillance and tracking applications, especially in large infrastructure-deficient environments. In this study, we develop a multi-UAV system to collect data dynamically in a resource-constrained context. The proposed approach consists of an access platform called Access UAV (A_UAV) that stochastically coordinates the data collection from the Inspection-UAVs (I_UAVs) equipped with a visual sensor to relay the same to the cloud. Our approach jointly considers the trajectory optimization of A_UAV and the stability of the data queues at each UAV. In particular, the Distance and Access Latency Aware Trajectory (DLAT) optimization for A_UAVs is developed, which generates a fair access schedule for I_UAVs. Moreover, a Lyapunov-based online optimization ensures the system stability of the average queue backlogs for dynamic data collection while minimizing total system energy. Coordination between I_UAV and A_UAV is achieved through a message-based mechanism. The simulation results validate the performance of our proposed approach against several baselines under different parameter settings.
]]>Authors: Noon Hussein Armstrong Nhlabatsi
The Internet of Things (IoT) has provided substantial enhancements to the communication of sensors, actuators, and their controllers, particularly in the field of home automation. Home automation is experiencing a huge rise in the proliferation of IoT devices such as smart bulbs, smart switches, and control gateways. However, the main challenge for such control systems is how to maximize security under limited resources such as low-processing power, low memory, low data rate, and low-bandwidth IoT networks. In order to address this challenge the adoption of IoT devices in automation has mandated the adoption of secure communication protocols to ensure that compromised key security objectives, such as confidentiality, integrity, and availability are addressed. In light of this, this work evaluates the feasibility of MQTT-based Denial of Service (DoS) attacks, Man-in-the-Middle (MitM), and masquerade attacks on a ZigBee network, an IoT standard used in wireless mesh networks. Performed through MQTT, the attacks extend to compromise neighboring Constrained Application Protocol (CoAP) nodes, a specialized service layer protocol for resource-constrained Internet devices. By demonstrating the attacks on an IKEA TRÅDFRI lighting system, the impact of exploiting ZigBee keys, the basis of ZigBee security, is shown. The reduction of vulnerabilities to prevent attacks is imperative for application developers in this domain. Two Intrusion Detection Systems (IDSs) are proposed to mitigate against the proposed attacks, followed by recommendations for solution providers to improve IoT firmware security. The main motivation and purpose of this work is to demonstrate that conventional attacks are feasible and practical in commercial home automation IoT devices, regardless of the manufacturer. Thus, the contribution to the state-of-the-art is the design of attacks that demonstrate how known vulnerabilities can be exploited in commercial IoT devices for the purpose of motivating manufacturers to produce IoT systems with improved security.
]]>Authors: Shensheng Tang
Queueing models can be used for making decisions about the resources required to provide high quality service. In this paper, a finite capacity single server queueing model with bulk arrivals is studied in IoT-based edge computing systems. The transient analysis of the model is carried out and the transient analytical solution to the system is derived with a group of recursive coefficients by using the ordinary differential equations (ODEs) technique. From which the steady-state probabilities are solved. Then, some performance metrics of interest are derived along with numerical results. Although the paper is initiated from the IoT based edge computing platform, the proposed system modeling and analysis method can be extended to more general situations such as telecommunication, manufacturing, transportation, and many other areas that are closely related to people’s daily lives.
]]>Authors: Gaetanino Paolone Danilo Iachetti Romolo Paesani Francesco Pilotti Martina Marinelli Paolino Di Felice
The Internet of Things (IoT) is a complex ecosystem of connected devices that exchange data over a wired or wireless network and whose final aim is to provide services either to humans or machines. The IoT has seen rapid development over the past decade. The total number of installed connected devices is expected to grow exponentially in the near future, since more and more domains are looking for IoT solutions. As a consequence, an increasing number of developers are approaching IoT technology for the first time. Unfortunately, the number of IoT-related studies published every year is becoming huge, with the obvious consequence that it would be impossible for anyone to predict the time that could be necessary to find a paper talking about a given problem at hand. This is the reason why IoT-related discussions have become predominant in various practitioners’ forums, which moderate thousands of posts each month. The present paper’s contribution is twofold. First, it aims at providing a holistic overview of the heterogeneous IoT world by taking into account a technology perspective and a business perspective. For each topic taken into account, a tutorial introduction (deliberately devoid of technical content to make this document within the reach of non-technical readers as well) is provided. Then, a table of very recent review papers is given for each topic, as the result of a systematic mapping study.
]]>Authors: Eugenia Petrangeli Nicola Tonellotto Carlo Vallati
Short-term energy-consumption forecasting plays an important role in the planning of energy production, transportation and distribution. With the widespread adoption of decentralised self-generating energy systems in residential communities, short-term load forecasting is expected to be performed in a distributed manner to preserve privacy and ensure timely feedback to perform reconfiguration of the distribution network. In this context, edge computing is expected to be an enabling technology to ensure decentralized data collection, management, processing and delivery. At the same time, federated learning is an emerging paradigm that fits naturally in such an edge-computing environment, providing an AI-powered and privacy-preserving solution for time-series forecasting. In this paper, we present a performance evaluation of different federated-learning configurations resulting in different privacy levels to the forecast residential energy consumption with data collected by real smart meters. To this aim, different experiments are run using Flower (a popular federated learning framework) and real energy consumption data. Our results allow us to demonstrate the feasibility of such an approach and to study the trade-off between data privacy and the accuracy of the prediction, which characterizes the quality of service of the system for the final users.
]]>Authors: Muriel Cabianca Maria Laura Clemente Gianluca Gatto Carlo Impagliazzo Lidia Leoni Martino Masia Riccardo Piras
This paper presents an exploratory activity with a drone inspection service for environmental control. The aim of the service is to provide technical support to decision-makers in environmental risk management. The proposed service uses IoT for the interaction between a mobile application, a Smart City platform, and an Unmanned Aircraft System (UAS). The mobile application allows the users to report risky situations, such as fire ignition, spills of pollutants in water, or illegal dumping; the user has only to specify the class of the event, while the geographical coordinates are automatically taken from device-integrated GPS. The message sent from the mobile application arrives to a Smart City platform, which shows all the received alerts on a 3D satellite map, to support decision-makers in choosing where a drone inspection is required. From the Smart City platform, the message is sent to the drone service operator; a CSV file defining the itinerary of the drone is automatically built and shown through the platform; the drone starts the mission providing a video, which is used by the decision-makers to understand whether the situation calls for immediate action. An experimental activity in an open field was carried out to validate the whole chain, from the alert to the drone mission, enriched by a Smart City platform to enable a decision-maker to better manage the situation.
]]>Authors: Elahe Fazeldehkordi Tor-Morten Grønli
The Internet of Things (IoT) is an innovative scheme providing massive applications that have become part of our daily lives. The number of IoT and connected devices are growing rapidly. However, transferring the corresponding huge, generated data from these IoT devices to the cloud produces challenges in terms of latency, bandwidth and network resources, data transmission costs, long transmission times leading to higher power consumption of IoT devices, service availability, as well as security and privacy issues. Edge computing (EC) is a promising strategy to overcome these challenges by bringing data processing and storage close to end users and IoT devices. In this paper, we first provide a comprehensive definition of edge computing and similar computing paradigms, including their similarities and differences. Then, we extensively discuss the major security and privacy attacks and threats in the context of EC-based IoT and provide possible countermeasures and solutions. Next, we propose a secure EC-based architecture for IoT applications. Furthermore, an application scenario of edge computing in IoT is introduced, and the advantages/disadvantages of the scenario based on edge computing and cloud computing are discussed. Finally, we discuss the most prominent security and privacy issues that can occur in EC-based IoT scenarios.
]]>Authors: Jaime K Devine Lindsay P. Schwartz Jake Choynowski Steven R Hursh
Global demand for sleep-tracking wearables, or consumer sleep technologies (CSTs), is steadily increasing. CST marketing campaigns often advertise the scientific merit of devices, but these claims may not align with consensus opinion from sleep research experts. Consensus opinion about CST features has not previously been established in a cohort of sleep researchers. This case study reports the results of the first survey of experts in real-world sleep research and a hypothetical purchase task (HPT) to establish economic valuation for devices with different features by price. Forty-six (N = 46) respondents with an average of 10 ± 6 years’ experience conducting research in real-world settings completed the online survey. Total sleep time was ranked as the most important measure of sleep, followed by objective sleep quality, while sleep architecture/depth and diagnostic information were ranked as least important. A total of 52% of experts preferred wrist-worn devices that could reliably determine sleep episodes as short as 20 min. The economic value was greater for hypothetical devices with a longer battery life. These data set a precedent for determining how scientific merit impacts the potential market value of a CST. This is the first known attempt to establish a consensus opinion or an economic valuation for scientifically desirable CST features and metrics using expert elicitation.
]]>Authors: Rubayyi Alghamdi Martine Bellaiche
Using the Internet of Things (IoT) for various applications, such as home and wearables devices, network applications, and even self-driven vehicles, detecting abnormal traffic is one of the problematic areas for researchers to protect network infrastructure from adversary activities. Several network systems suffer from drawbacks that allow intruders to use malicious traffic to obtain unauthorized access. Attacks such as Distributed Denial of Service attacks (DDoS), Denial of Service attacks (DoS), and Service Scans demand a unique automatic system capable of identifying traffic abnormality at the earliest stage to avoid system damage. Numerous automatic approaches can detect abnormal traffic. However, accuracy is not only the issue with current Intrusion Detection Systems (IDS), but the efficiency, flexibility, and scalability need to be enhanced to detect attack traffic from various IoT networks. Thus, this study concentrates on constructing an ensemble classifier using the proposed Integrated Evaluation Metrics (IEM) to determine the best performance of IDS models. The automated Ranking and Best Selection Method (RBSM) is performed using the proposed IEM to select the best model for the ensemble classifier to detect highly accurate attacks using machine learning and deep learning techniques. Three datasets of real IoT traffic were merged to extend the proposed approach’s ability to detect attack traffic from heterogeneous IoT networks. The results show that the performance of the proposed model achieved the highest accuracy of 99.45% and 97.81% for binary and multi-classification, respectively.
]]>Authors: Mehreen Tahir Muhammad Intizar Ali
Federated Learning (FL) is a state-of-the-art technique used to build machine learning (ML) models based on distributed data sets. It enables In-Edge AI, preserves data locality, protects user data, and allows ownership. These characteristics of FL make it a suitable choice for IoT networks due to its intrinsic distributed infrastructure. However, FL presents a few unique challenges; the most noteworthy is training over largely heterogeneous data samples on IoT devices. The heterogeneity of devices and models in the complex IoT networks greatly influences the FL training process and makes traditional FL unsuitable to be directly deployed, while many recent research works claim to mitigate the negative impact of heterogeneity in FL networks, unfortunately, the effectiveness of these proposed solutions has never been studied and quantified. In this study, we thoroughly analyze the impact of heterogeneity in FL and present an overview of the practical problems exerted by the system and statistical heterogeneity. We have extensively investigated state-of-the-art algorithms focusing on their practical use over IoT networks. We have also conducted a comparative analysis of the top available federated algorithms over a heterogeneous dynamic IoT network. Our analysis shows that the existing solutions fail to effectively mitigate the problem, thus highlighting the significance of incorporating both system and statistical heterogeneity in FL system design.
]]>Authors: Claudio Marche Michele Nitti
The Internet of Things is enriching our life with an ecosystem of interconnected devices. Object cooperation allows us to develop complex applications in which each node contributes one or more services. Therefore, the information moves from a provider to a requester node in a peer-to-peer network. In that scenario, trust management systems (TMSs) have been developed to prevent the manipulation of data by unauthorized entities and guarantee the detection of malicious behaviour. The community concentrates effort on designing complex trust techniques to increase their effectiveness; however, two strong assumptions have been overlooked. First, nodes could provide the wrong services due to malicious behaviours or malfunctions and insufficient accuracy. Second, the requester nodes usually cannot evaluate the received service perfectly. For this reason, a trust system should distinguish attackers from objects with poor performance and consider service evaluation errors. Simulation results prove that advanced trust algorithms are unnecessary for such scenarios with these deficiencies.
]]>Authors: Carlo Giannelli Marco Picone
During the last decade, the advent of the Internet of Things (IoT) and its quick and pervasive evolution have significantly revolutionized the Information Technology ecosystem [...]
]]>Authors: Maximilien Charlier Remous-Aris Koutsiamanis Bruno Quoitin
In this paper, we present and evaluate an ultra-wideband (UWB) indoor processing architecture that allows the performing of simultaneous localizations of mobile tags. This architecture relies on a network of low-power fixed anchors that provide forward-ranging measurements to a localization engine responsible for performing trilateration. The communications within this network are orchestrated by UWB-TSCH, an adaptation to the ultra-wideband (UWB) wireless technology of the time-slotted channel-hopping (TSCH) mode of IEEE 802.15.4. As a result of global synchronization, the architecture allows deterministic channel access and low power consumption. Moreover, it makes it possible to communicate concurrently over multiple frequency channels or using orthogonal preamble codes. To schedule communications in such a network, we designed a dedicated centralized scheduler inspired from the traffic aware scheduling algorithm (TASA). By organizing the anchors in multiple cells, the scheduler is able to perform simultaneous localizations and transmissions as long as the corresponding anchors are sufficiently far away to not interfere with each other. In our indoor positioning system (IPS), this is combined with dynamic registration of mobile tags to anchors, easing mobility, as no rescheduling is required. This approach makes our ultra-wideband (UWB) indoor positioning system (IPS) more scalable and reduces deployment costs since it does not require separate networks to perform ranging measurements and to forward them to the localization engine. We further improved our scheduling algorithm with support for multiple sinks and in-network data aggregation. We show, through simulations over large networks containing hundreds of cells, that high positioning rates can be achieved. Notably, we were able to fully schedule a 400-cell/400-tag network in less than 11 s in the worst case, and to create compact schedules which were up to 11 times shorter than otherwise with the use of aggregation, while also bounding queue sizes on anchors to support realistic use situations.
]]>Authors: Pavana Pradeep Krishna Kant
Internet of Things (IoT) systems are becoming ubiquitous in various cyber–physical infrastructures, including buildings, vehicular traffic, goods transport and delivery, manufacturing, health care, urban farming, etc. Often multiple such IoT subsystems are deployed in the same physical area and designed, deployed, maintained, and perhaps even operated by different vendors or organizations (or “parties”). The collective operational behavior of multiple IoT subsystems can be characterized via (1) a set of operational rules and required safety properties and (2) a collection of IoT-based services or applications that interact with one another and share concurrent access to the devices. In both cases, this collective behavior often leads to situations where their operation may conflict, and the conflict resolution becomes complex due to lack of visibility into or understanding of the cross-subsystem interactions and inability to do cross-subsystem actuations. This article addresses the fundamental problem of detecting and resolving safety property violations. We detail the inherent complexities of the problem, survey the work already performed, and layout the future challenges. We also highlight the significance of detecting/resolving conflicts proactively, i.e., dynamically but with a look-ahead into the future based on the context.
]]>Authors: Martina Pappalardo Antonio Virdis Enzo Mingozzi
The Internet of Things (IoT) brings Internet connectivity to devices and everyday objects. This huge volume of connected devices has to be managed taking into account the severe energy, memory, processing, and communication constraints of IoT devices and networks. In this context, the OMA LightweightM2M (LWM2M) protocol is designed for remote management of constrained devices, and related service enablement, through a management server usually deployed in a distant cloud data center. Following the Edge Computing paradigm, we propose in this work the introduction of a LWM2M Proxy that is deployed at the network edge, in between IoT devices and management servers. On one hand, the LWM2M Proxy improves various LWM2M management procedures whereas, on the other hand, it enables the support of QoS-aware services provided by IoT devices by allowing the implementation of advanced policies to efficiently use network, computing, and storage (i.e., cache) resources at the edge, thus providing benefits in terms of reduced and more predictable end-to-end latency. We evaluate the proposed solution both by simulation and experimentally, showing that it can strongly improve the LWM2M performance and the QoS of the system.
]]>Authors: Emmanuel Tuyishimire Antoine Bagula Slim Rekhis Noureddine Boudriga
The use of Unmanned Aerial Vehicles (UAVs) in data transport has attracted a lot of attention and applications, as a modern traffic engineering technique used in data sensing, transport, and delivery to where infrastructure is available for its interpretation. Due to UAVs’ constraints such as limited power lifetime, it has been necessary to assist them with ground sensors to gather local data, which has to be transferred to UAVs upon visiting the sensors. The management of such ground sensor communication together with a team of flying UAVs constitutes an interesting data muling problem, which still deserves to be addressed and investigated. This paper revisits the issue of traffic engineering in Internet-of-Things (IoT) settings, to assess the relevance of using UAVs for the persistent collection of sensor readings from the sensor nodes located in an environment and their delivery to base stations where further processing is performed. We propose a persistent path planning and UAV allocation model, where a team of heterogeneous UAVs coming from various base stations are used to collect data from ground sensors and deliver the collected information to their closest base stations. This problem is mathematically formalised as a real-time constrained optimisation model, and proven to be NP-hard. The paper proposes a heuristic solution to the problem and evaluates its relative efficiency through performing experiments on both artificial and real sensors networks, using various scenarios of UAVs settings.
]]>Authors: Bastien Confais Benoît Parrein
Current network architectures such as Cloud computing are not adapted to provide an acceptable Quality of Service (QoS) to the large number of tiny devices that compose the Internet of Things (IoT) [...]
]]>Authors: Rahul Agrahari Matthew Nicholson Clare Conran Haytham Assem John D. Kelleher
In this paper, we compare and assess the efficacy of a number of time-series instance feature representations for anomaly detection. To assess whether there are statistically significant differences between different feature representations for anomaly detection in a time series, we calculate and compare confidence intervals on the average performance of different feature sets across a number of different model types and cross-domain time-series datasets. Our results indicate that the catch22 time-series feature set augmented with features based on rolling mean and variance performs best on average, and that the difference in performance between this feature set and the next best feature set is statistically significant. Furthermore, our analysis of the features used by the most successful model indicates that features related to mean and variance are the most informative for anomaly detection. We also find that features based on model forecast errors are useful for anomaly detection for some but not all datasets.
]]>Authors: IoT Editorial Office IoT Editorial Office
Rigorous peer-reviews are the basis of high-quality academic publishing [...]
]]>Authors: Suzanne K. Thomas Adam Pockett Krishna Seunarine Michael Spence Dimitrios Raptis Simone Meroni Trystan Watson Matt Jones Matthew J. Carnie
The number of interconnected devices, often referred to as the Internet of Things (IoT), is increasing at a considerable rate. It is inevitable therefore that so too will the energy demand. IoT describes a range of technologies such as sensors, software, smart meters, wearable devices, and communication beacons for the purpose of connecting and exchanging data with other devices and systems over the internet. Often not located near a mains supply power source, these devices may be reliant on primary battery cells. To avoid the need to periodically replace these batteries, it makes sense to integrate the technologies with a photovoltaic (PV) cell to harvest ambient light, so that the technologies can be said to be self-powered. Perovskite solar cells have proven extremely efficient in low-light conditions but in the absence of ambient and low-light testing standards, or even a consensus on what is defined by “ambient light”, it is difficult to estimate the energy yield of a given PV technology in a given scenario. Ambient light harvesting is complex, subject to spectral considerations, and whether the light source is directly incident on the PV cell. Here, we present a realistic scenario-driven method for measuring the energy yield for a given PV technology in various situations in which an IoT device may be found. Furthermore, we show that laboratory-built p-i-n perovskite devices, for many scenarios, produce energy yields close to that of commercial GaAs solar cells. Finally, we demonstrate an IoT device, powered by a mesoporous carbon perovskite solar module and supercapacitor, and operating through several day–night cycles.
]]>Authors: Vasileios Nikolopoulos Mara Nikolaidou Maria Voreakou Dimosthenis Anagnostopoulos
In Fog Computing, fog colonies are formed by nodes cooperating to provide services to end-users. To enable efficient operation and seamless scalability of fog colonies, decentralized control over participating nodes should be promoted. In such cases, autonomous Fog Nodes operate independently, sharing the context in which all colony members provide their services. In the paper, we explore different techniques of context diffusion and knowledge sharing between autonomous Fog Nodes within a fog colony, using ECTORAS, a publish/subscribe protocol. With ECTORAS, nodes become actively aware of their operating context, share contextual information and exchange operational policies to achieve self-configuration, self-adaptation and context awareness in an intelligent manner. Two different ECTORAS implementations are studied, one offering centralized control with the existence of a message broker, to manage colony participants and available topics, and one fully decentralized, catering to the erratic topology that Fog Computing may produce. The two schemes are tested as the Fog Colony size is expanding in terms of performance and energy consumption, in a prototype implementation based on Raspberry Pi nodes for smart building management.
]]>Authors: Yann Stephen Mandza Atanda Raji
In developing countries today, population growth and the penetration of higher standard of living appliances in homes has resulted in a rapidly increasing residential load. In South Africa, the recent rolling blackouts and electricity price increase only highlighted this reality, calling for sustainable measures to reduce overall consumption and peak load. The dawn of the smart grid concept, embedded systems, and ICTs have paved the way for novel Home Energy Management Systems (HEMS) design. In this regard, the Internet of Things (IoT), an enabler for intelligent and efficient energy management systems, is the subject of increasing attention for optimizing HEMS design and mitigating its deployment cost constraints. In this work, we propose an IoT platform for residential energy management applications focusing on interoperability, low cost, technology availability, and scalability. We addressed the backend complexities of IoT Home Area Networks (HAN) using the Open Consortium Foundation (OCF) IoTivity-Lite middleware. To augment the quality, servicing, reduce the cost, and the development complexities, this work leverages open-source cloud technologies from Back4App as Backend-as-a-Service (BaaS) to provide consumers and utilities with a data communication platform within an experimental study illustrating time and space agnostic “mind-changing” energy feedback, Demand Response Management (DRM) under a peak shaving algorithm yielded peak load reduction around 15% of the based load, and appliance operation control using a HEM App via an Android smartphone.
]]>Authors: Davi V. Q. Rodrigues Delong Zuo Changzhi Li
Researchers have made substantial efforts to improve the measurement of structural reciprocal motion using radars in the last years. However, the signal-to-noise ratio of the radar’s received signal still plays an important role for long-term monitoring of structures that are susceptible to excessive vibration. Although the prolonged monitoring of structural deflections may provide paramount information for the assessment of structural condition, most of the existing structural health monitoring (SHM) works did not consider the challenges to handle long-term displacement measurements when the signal-to-noise ratio of the measurement is low. This may cause discontinuities in the detected reciprocal motion and can result in wrong assessments during the data analyses. This paper introduces a novel approach that uses a wavelet-based multi-resolution analysis to correct short-term distortions in the calculated displacements even when previously proposed denoising techniques are not effective. Experimental results are presented to validate and demonstrate the feasibility of the proposed algorithm. The advantages and limitations of the proposed approach are also discussed.
]]>Authors: Hossein Hassani Nadejda Komendantova Daniel Kroos Stephan Unger Mohammad Reza Yeganegi
The importance of energy security for the successful functioning of private companies, national economies, and the overall society cannot be underestimated. Energy is a critical infrastructure for any modern society, and its reliable functioning is essential for all economic sectors and for the well-being of everybody. Uncertainty in terms of the availability of information, namely reliable data to make predictions and to plan for investment as well as for other actions of stakeholders in the energy markets is one of the factors with the highest influence on energy security. This uncertainty can be connected with many factors, such as the availability of reliable data or actions of stakeholders themselves. For example, the recent outbreak of the COVID-19 pandemic revealed negative impacts of uncertainty on decision-making processes and markets. At the time point when the market participants started to receive real-time information about the situation, the energy markets began to ease. This is one scenario where Big Data can be used to amplify information to various stakeholders to prevent panic and to ensure market stability and security of supply. Considering the novelty of this topic, our methodology is based on the meta-analysis of existing studies in the area of impacts of energy security on private companies, the national economy, and society. The results show that, in a fast-paced digital world characterized by technological advances, the use of Big Data technology provides a unique niche point to close this gap in information disparity by levering the use of unconventional data sources to integrate technologies, stakeholders, and markets to promote energy security and market stability. The potential of Big Data technology is yet to be fully utilized. Big Data can handle large data sets characterized by volume, variety, velocity, value, and complexity. Our conclusion is that the challenge for energy markets is to leverage this technology to mine available socioeconomic, political, geographic, and environmental data responsibly and to provide indicators that predict future global supply and demand. This information is crucial for energy security and ensuring global economic prosperity.
]]>Authors: Mario Noseda Lea Zimmerli Tobias Schläpfer Andreas Rüst
New protocol stacks provide wireless IPv6 connectivity down to low power embedded IoT devices. From a security point of view, this leads to high exposure of such IoT devices. Consequently, even though they are highly resource-constrained, these IoT devices need to fulfil similar security requirements as conventional computers. The challenge is to leverage well-known cybersecurity techniques for such devices without dramatically increasing power consumption (and therefore reducing battery lifetime) or the cost regarding memory sizes and required processor performance. Various semiconductor vendors have introduced dedicated hardware devices, so-called secure elements that address these cryptographic challenges. Secure elements provide tamper-resistant memory and hardware-accelerated cryptographic computation support. Moreover, they can be used for mutual authentication with peers, ensuring data integrity and confidentiality, and various other security-related use cases. Nevertheless, publicly available performance figures on energy consumption and execution times are scarce. This paper introduces the concept of secure elements and provides a measurement setup for selected individual cryptographic primitives and a Datagram Transport Layer Security (DTLS) handshake over secure Constrained Application Protocol (CoAPs) in a realistic use case. Consequently, the paper presents quantitative results for the performance of five secure elements. Based on these results, we discuss the characteristics of the individual secure elements and supply developers with the information needed to select a suitable secure element for a specific application.
]]>Authors: Kosuke Ito Shuji Morisaki Atsuhiro Goto
This study proposes a security-quality-metrics method tailored for the Internet of things (IoT) and evaluates conformity of the proposed approach with pertinent cybersecurity regulations and guidelines for IoT. Cybersecurity incidents involving IoT devices have recently come to light; consequently, IoT security correspondence has become a necessity. The ISO 25000 series is used for software; however, the concept of security as a quality factor has not been applied to IoT devices. Because software vulnerabilities were not the device vendors’ responsibility as product liability, most vendors did not consider the security capability of IoT devices as part of their quality control. Furthermore, an appropriate IoT security-quality metric for vendors does not exist; instead, vendors have to set their security standards, which lack consistency and are difficult to justify by themselves. To address this problem, the authors propose a universal method for specifying IoT security-quality metrics on a globally accepted scale, inspired by the goal/question/metric (GQM) method. The method enables vendors to verify their products to conform to the requirements of existing baselines and certification programs and to help vendors to tailor their quality requirements to meet the given security requirements. The IoT users would also be able to use these metrics to verify the security quality of IoT devices.
]]>Authors: Konstantina Zachila Konstantinos Kotis Evangelos Paparidis Stamatia Ladikou Dimitris Spiliotopoulos
Nowadays, cultural spaces (e.g., museums and archaeological sites) are interested in adding intelligence in their ecosystem by deploying different types of smart applications such as automated environmental monitoring, energy saving, and user experience optimization. Such an ecosystem is better realized through semantics in order to efficiently represent the required knowledge for facilitating interoperability among different application domains, integration of data, and inference of new knowledge as insights into what may have not been observed at first sight. This paper reports on our recent efforts for the engineering of a smart museum (SM) ontology that meets the following objectives: (a) represent knowledge related to trustworthy IoT entities that “live” and are deployed in a SM, i.e., things, sensors, actuators, people, data, and applications; (b) deal with the semantic interoperability and integration of heterogeneous SM applications and data; (c) represent knowledge related to museum visits and visitors toward enhancing their visiting experience; (d) represent knowledge related to smart energy saving; (e) represent knowledge related to the monitoring of environmental conditions in museums; and (f) represent knowledge related to the space and location of exhibits and collections. The paper not only contributes a novel SM ontology, but also presents the updated HCOME methodology for the agile, human-centered, collaborative and iterative engineering of living, reused, and modular ontologies.
]]>Authors: Ljiljana Stojanovic Thomas Usländer Friedrich Volz Christian Weißenbacher Jens Müller Michael Jacoby Tino Bischoff
The concept of digital twins (DT) has already been discussed some decades ago. Digital representations of physical assets are key components in industrial applications as they are the basis for decision making. What is new is the conceptual approach to consider DT as well-defined software entities themselves that follow the whole lifecycle of their physical counterparts from the engineering, operation up to the discharge, and hence, have their own type description, identity, and lifecycle. This paper elaborates on this idea and argues the need for systematic DT engineering and management. After a conceptual description of DT, the paper proposes a DT lifecycle model and presents methodologies and tools for DT management, also in the context of Industrie 4.0 concepts, such as the asset administration shell (AAS), the international data spaces (IDS), and IEC standards (such as OPC UA and AML). As a tool example for the support of DT engineering and management, the Fraunhofer-advanced AAS tools for digital twins (FA3ST) are presented in more detail.
]]>Authors: Rachel M. Billings Alan J. Michaels
While a variety of image processing studies have been performed to quantify the potential performance of neural network-based models using high-quality still images, relatively few studies seek to apply those models to a real-time operational context. This paper seeks to extend prior work in neural-network-based mask detection algorithms to a real-time, low-power deployable context that is conducive to immediate installation and use. Particularly relevant in the COVID-19 era with varying rules on mask mandates, this work applies two neural network models to inference of mask detection in both live (mobile) and recorded scenarios. Furthermore, an experimental dataset was collected where individuals were encouraged to use presentation attacks against the algorithm to quantify how perturbations negatively impact model performance. The results from evaluation on the experimental dataset are further investigated to identify the degradation caused by poor lighting and image quality, as well as to test for biases within certain demographics such as gender and ethnicity. In aggregate, this work validates the immediate feasibility of a low-power and low-cost real-time mask recognition system.
]]>Authors: Kiernan George Alan J. Michaels
This paper focuses on a block cipher adaptation of the Galois Extension Fields (GEF) combination technique for PRNGs and targets application in the Internet of Things (IoT) space, an area where the combination technique was concluded as a quality stream cipher. Electronic Codebook (ECB) and Cipher Feedback (CFB) variations of the cryptographic algorithm are discussed. Both modes offer computationally efficient, scalable cryptographic algorithms for use over a simple combination technique like XOR. The cryptographic algorithm relies on the use of quality PRNGs, but adds an additional layer of security while preserving maximal entropy and near-uniform distributions. The use of matrices with entries drawn from a Galois field extends this technique to block size chunks of plaintext, increasing diffusion, while only requiring linear operations that are quick to perform. The process of calculating the inverse differs only in using the modular inverse of the determinant, but this can be expedited by a look-up table. We validate this GEF block cipher with the NIST test suite. Additional statistical tests indicate the condensed plaintext results in a near-uniform distributed ciphertext across the entire field. The block cipher implemented on an MSP430 offers a faster, more power-efficient alternative to the Advanced Encryption Standard (AES) system. This cryptosystem is a secure, scalable option for IoT devices that must be mindful of time and power consumption.
]]>Authors: Charalampos Orfanidis Atis Elsts Paul Pop Xenofon Fafoutis
Time Slotted Channel Hopping (TSCH) is a medium access protocol defined in the IEEE 802.15.4 standard. It has proven to be one of the most reliable options when it comes to industrial applications. TSCH offers a degree of high flexibility and can be tailored to the requirements of specific applications. Several performance aspects of TSCH have been investigated so far, such as the energy consumption, reliability, scalability and many more. However, mobility in TSCH networks remains an aspect that has not been thoroughly explored. In this paper, we examine how TSCH performs under mobility situations. We define two mobile scenarios: one where autonomous agriculture vehicles move on a predefined trail, and a warehouse logistics scenario, where autonomous robots/vehicles and workers move randomly. We examine how different TSCH scheduling approaches perform on these mobility patterns and when a different number of nodes are operating. The results show that the current TSCH scheduling approaches are not able to handle mobile scenarios efficiently. Moreover, the results provide insights on how TSCH scheduling can be improved for mobile applications.
]]>Authors: Amna Batool Seng W. Loke Niroshinie Fernando Jonathan Kua
This paper proposes a policy management framework which we call the SANIJO framework. This framework comprises three different types of policy rules that are applicable to smart devices for managing their multiuser–multidevice interactions in IoT collectives, from a socio-ethical perspective. We developed a policy language to help regulate and manage the interaction behaviors of smart internet-connected devices that are being deployed at an increasing rate around the world. The policy rules are classified into Authorization, Obligation, and Prohibition rules and are prototyped in the SANIJO system. We implemented our framework as a collection of mobile apps (running on smartphones) and a robot app (running on the robot). We then illustrate its operation based on an aged care center scenario.
]]>Authors: Oluwashina Joseph Ajayi Joseph Rafferty Jose Santos Matias Garcia-Constantino Zhan Cui
The scale of Internet of Things (IoT) systems has expanded in recent times and, in tandem with this, IoT solutions have developed symbiotic relationships with technologies, such as edge Computing. IoT has leveraged edge computing capabilities to improve the capabilities of IoT solutions, such as facilitating quick data retrieval, low latency response, and advanced computation, among others. However, in contrast with the benefits offered by edge computing capabilities, there are several detractors, such as centralized data storage, data ownership, privacy, data auditability, and security, which concern the IoT community. This study leveraged blockchain’s inherent capabilities, including distributed storage system, non-repudiation, privacy, security, and immutability, to provide a novel, advanced edge computing architecture for IoT systems. Specifically, this blockchain-based edge computing architecture addressed centralized data storage, data auditability, privacy, data ownership, and security. Following implementation, the performance of this solution was evaluated to quantify performance in terms of response time and resource utilization. The results show the viability of the proposed and implemented architecture, characterized by improved privacy, device data ownership, security, and data auditability while implementing decentralized storage.
]]>Authors: Filippo Morselli Luca Bedogni Umberto Mirani Michele Fantoni Simone Galasso
The Fourth Industrial Revolution has led to the adoption of novel technologies and methodologies in factories, making these more efficient and productive. Among the new services which are changing industry, there are those based on machine learning algorithms, which enable machines to learn from their past observations and hence possibly forecast future states. Specifically, predictive maintenance represents the opportunity to understand in advance possible machine outages due to broken parts and schedule the necessary maintenance operations. However, in real scenarios predictive maintenance struggles to be adopted due to a multitude of variables and the heavy customization it requires. In this work, we propose a novel framework for predictive maintenance, which is trained online to recognize new issues reported by the operators. Our framework, tested on different scenarios and with a varying number and several kinds of sensors, shows recall levels above 0.85, demonstrating its effectiveness and adaptability.
]]>Authors: Felipe Lemus-Prieto Juan Francisco Bermejo Martín José-Luis Gónzalez-Sánchez Enrique Moreno Sánchez
CultivData proposes the convergence of technologies, such as IoT, big data, HPC, open data and artificial intelligence, to apply HPDA (High Performance Data Analytics) to the cultivation of agricultural data and improve the efficiency and effectiveness of farms. An information system has been developed as an IT platform for the cultivation of open data to extract knowledge and to support the decision making of stakeholders in the agricultural sector, so that it is possible to improve product quality and farm productivity. The resulting system integrates access to data provided by IoT devices that sensorize farms and public and open data sources (Open Data). The platform was designed to make precision agriculture a reality and to be useful not only to farmers, but also to agricultural decision-makers who plan species and crops based on data such as available water; expected weather; prices and market demands, and so forth. In addition, the platform provides to agricultural producers access to historical climate data; climate forecasts to anticipate times of drought or disasters; pest situations or monitoring of their plantations with sensorization and orthophotographs.
]]>Authors: Andrew John Poulter Simon J. Cox
This paper assesses the relative performance of the MQTT protocol in comparison to the Secure Remote Update Protocol (SRUP) in a number of simulated real-world conditions, and describes an experiment that has been conducted to measure the processing delay associated with the use of the more secure protocol. Experimental measurements for power consumption of the devices and the size of comparable TCP packets were also made. Analysis shows that the use of the SRUP protocol added an additional processing delay of between 42.92 ms and 51.60 ms—depending on the specific hardware in use. There was also shown to be a 55.47% increase in power consumption when running the secure SRUP protocol, compared with an MQTT implementation.
]]>Authors: Ghassan Fadlallah Hamid Mcheick Djamal Rebaine
Pervasive collaborative computing within the Internet of Things (IoT) has progressed rapidly over the last decade. Nevertheless, emerging architectural models and their applications still suffer from limited capacity in areas like power, efficient computing, memory, connectivity, latency and bandwidth. Technological development is still in progress in the fields of hardware, software and wireless communications. Their communication is usually done via the Internet and wireless via base stations. However, these models are sometimes subject to connectivity failures and limited coverage. The models that incorporate devices with peer-to-peer (P2P) communication technologies are of great importance, especially in harsh environments. Nevertheless, their power-limited devices are randomly distributed on the periphery where their availability can be limited and arbitrary. Despite these limitations, their capabilities and efficiency are constantly increasing. Accelerating development in these areas can be achieved by improving architectures and technologies of pervasive collaborative computing, which refers to the collaboration of mobile and embedded computing devices. To enhance mobile collaborative computing, especially in the models acting at the network’s periphery, we are interested in modernizing and strengthening connectivity using wireless technologies and P2P communication. Therefore, the main goal of this paper is to enhance and maintain connectivity and improve the performance of these pervasive systems while performing the required and expected services in a challenging environment. This is especially important in catastrophic situations and harsh environments, where connectivity is used to facilitate and enhance rescue operations. Thus, we have established a resilient mobile collaborative architectural model comprising a peripheral autonomous network of pervasive devices that considers the constraints of these resources. By maintaining the connectivity of its devices, this model can operate independently of wireless base stations by taking advantage of emerging P2P connection technologies such as Wi-Fi Direct and those enabled by LoPy4 from Pycom such as LoRa, BLE, Sigfox, Wi-Fi, Radio Wi-Fi and Bluetooth. Likewise, we have designed four algorithms to construct a group of devices, calculate their scores, select a group manager, and exchange inter- and intra-group messages. The experimental study we conducted shows that this model continues to perform efficiently, even in circumstances like the breakdown of wireless connectivity due to an extreme event or congestion from connecting a huge number of devices.
]]>Authors: Hossein Hassani Pedram Amiri Andi Alireza Ghodsi Kimia Norouzi Nadejda Komendantova Stephan Unger
Digitization is the emerging process in the current transformation of industry. Understanding the role and socio-economic consequences of digitalization is crucial for the way technology is being deployed in each sector. One of the affected sectors is dentistry. This study highlights the current advances and challenges in integrating and merging artificial intelligence (AI), intelligence augmentation (IA), and machine learning (ML) in dentistry. We conduct a comparative analysis to give an overview of which technology is being currently deployed and what role IA and AI will play in dentistry, as AI plays an assistive role in advancing human capabilities. We find that challenges range from AI finding its way into routine medical practice to qualitative challenges of retrieving adequate data input. Other challenges lie in the yet unanswered questions of liability in how to reduce deployment costs of new technology. Given these challenges, we provide an outlook of how future technology can be deployed in daily-life dentistry and how robots and humans will interact, given the current technology developments. The aim of this paper is to discuss the future of dentistry and whether it is AI or IA conquering the modern dentistry era.
]]>Authors: Claudio Marche Luigi Serreli Michele Nitti
The Internet of Things (IoT) is transforming the world into an ecosystem of objects that communicate with each other to enrich our lives. The devices’ collaboration allows the creation of complex applications, where each object can provide one or more services needed for global benefit. The information moves to nodes in a peer-to-peer network, in which the concept of trustworthiness is essential. Trust and Reputation Models (TRMs) are developed with the goal of guaranteeing that actions taken by entities in a system reflect their trustworthiness values and to prevent these values from being manipulated by malicious entities. The cornerstone of any TRM is the ability to generate a coherent evaluation of the information received. Indeed, the feedback generated by the consumers of the services has a vital role as the source of any trust model. In this paper, we focus on the generation of the feedback and propose different metrics to evaluate it. Moreover, we illustrate a new collusive attack that influences the evaluation of the received services. Simulations with a real IoT dataset show the importance of feedback generation and the impact of the new proposed attack.
]]>Authors: Pietro Battistoni Monica Sebillo Giuliana Vitiello
The European Agency for Safety and Health at Work considers Smart Personal Protective Equipment as “Intelligent Protection For The Future”. It mainly consists of electronic components that collect data about their use, the workers who wear them, and the working environment. This paper proposes a distributed solution of Smart Personal Protective Equipment for the safety monitoring of Lone Workers by adopting low-cost electronic devices. In addition to the same hazards as anyone else, Lone Workers need additional and specific systems due to the higher risk they run on a work site. To this end, the Edge-Computing paradigm can be adopted to deploy an architecture embedding wearable devices, which alerts safety managers when workers do not wear the prescribed Personal Protective Equipment and supports a fast rescue when a worker seeks help or an accidental fall is automatically detected. The proposed system is a work-in-progress which provides an architecture design to accommodate different requirements, namely the deployment difficulties at temporary and large working sites, the maintenance and connectivity recurring cost issues, the respect for the workers’ privacy, and the simplicity of use for workers and their supervisors.
]]>Authors: George D. O’Mahony Kevin G. McCarthy Philip J. Harris Colin C. Murphy
Classifying fluctuating operating wireless environments can be crucial for successfully delivering authentic and confidential packets and for identifying legitimate signals. This study utilizes raw in-phase (I) and quadrature-phase (Q) samples, exclusively, to develop a low-order statistical feature set for wireless signal classification. Edge devices making decentralized decisions from I/Q sample analysis is beneficial. Implementing appropriate security and transmitting mechanisms, reducing retransmissions and increasing energy efficiency are examples. Wireless sensor networks (WSNs) and their Internet of Things (IoT) utilization emphasize the significance of this time series classification problem. Here, I/Q samples of typical WSN and industrial, scientific and medical band transmissions are collected in a live operating environment. Analog Pluto software-defined radios and Raspberry Pi devices are utilized to achieve a low-cost yet high-performance testbed. Features are extracted from Matlab-based statistical analysis of the I/Q samples across time, frequency (fast Fourier transform) and space (probability density function). Noise, ZigBee, continuous wave jamming, WiFi and Bluetooth signal data are examined. Supervised machine learning approaches, including support vector machines, Random Forest, XGBoost, k nearest neighbors and a deep neural network (DNN), evaluate the developed feature set. The optimal approach is determined as an XGBoost/SVM classifier. This classifier achieves similar accuracy and generalization results, on unseen data, to the DNN, but for a fraction of time and computation requirements. Compared to existing approaches, this study’s principal contribution is the developed low-order feature set that achieves signal classification without prior network knowledge or channel assumptions and is validated in a real-world wireless operating environment. The feature set can extend the development of resource-constrained edge devices as it is widely deployable due to only requiring received I/Q samples and these features are warranted as IoT devices become widely used in various modern applications.
]]>Authors: Imtiaz Ullah Ayaz Ullah Mazhar Sajjad
The tremendous number of Internet of Things (IoT) applications, with their ubiquity, has provided us with unprecedented productivity and simplified our daily life. At the same time, the insecurity of these technologies ensures that our daily lives are surrounded by vulnerable computers, allowing for the launch of multiple attacks via large-scale botnets through the IoT. These attacks have been successful in achieving their heinous objectives. A strong identification strategy is essential to keep devices secured. This paper proposes and implements a model for anomaly-based intrusion detection in IoT networks that uses a convolutional neural network (CNN) and gated recurrent unit (GRU) to detect and classify binary and multiclass IoT network data. The proposed model is validated using the BoT-IoT, IoT Network Intrusion, MQTT-IoT-IDS2020, and IoT-23 intrusion detection datasets. Our proposed binary and multiclass classification model achieved an exceptionally high level of accuracy, precision, recall, and F1 score.
]]>Authors: Seng W. Loke
The Internet of Things is emerging as a vast, inter-connected space of devices and things surrounding people, many of which are increasingly capable of autonomous action, from automatically sending data to cloud servers for analysis, changing the behaviour of smart objects, to changing the physical environment. A wide range of ethical concerns has arisen in their usage and development in recent years. Such concerns are exacerbated by the increasing autonomy given to connected things. This paper reviews, via examples, the landscape of ethical issues, and some recent approaches to address these issues concerning connected things behaving autonomously as part of the Internet of Things. We consider ethical issues in relation to device operations and accompanying algorithms. Examples of concerns include unsecured consumer devices, data collection with health-related Internet of Things, hackable vehicles, behaviour of autonomous vehicles in dilemma situations, accountability with Internet of Things systems, algorithmic bias, uncontrolled cooperation among things, and automation affecting user choice and control. Current ideas towards addressing a range of ethical concerns are reviewed and compared, including programming ethical behaviour, white-box algorithms, black-box validation, algorithmic social contracts, enveloping IoT systems, and guidelines and code of ethics for IoT developers; a suggestion from the analysis is that a multi-pronged approach could be useful based on the context of operation and deployment.
]]>Authors: Amy Vennos Kiernan George Alan Michaels
This paper explores the security of a single-stage residue number system (RNS) pseudorandom number generator (PRNG), which has previously been shown to provide extremely high-quality outputs when evaluated through available RNG statistical test suites or in using Shannon and single-stage Kolmogorov entropy metrics. In contrast, rather than blindly performing statistical analyses on the outputs of the single-stage RNS PRNG, this paper provides both white box and black box analyses that facilitate reverse engineering of the underlying RNS number generation algorithm to obtain the residues, or equivalently key, of the RNS algorithm. We develop and demonstrate a conditional entropy analysis that permits extraction of the key given a priori knowledge of state transitions as well as reverse engineering of the RNS PRNG algorithm and parameters (but not the key) in problems where the multiplicative RNS characteristic is too large to obtain a priori state transitions. We then discuss multiple defenses and perturbations for the RNS system that fool the original attack algorithm, including deliberate noise injection and code hopping. We present a modification to the algorithm that accounts for deliberate noise, but rapidly increases the search space and complexity. Lastly, we discuss memory requirements and time required for the attacker and defender to maintain these defenses.
]]>Authors: Arthur Fournier Franjieh El Khoury Samuel Pierre
The rapid adoption of Android devices comes with the growing prevalence of mobile malware, which leads to serious threats to mobile phone security and attacks private information on mobile devices. In this paper, we designed and implemented a model for malware detection on Android devices to protect private and financial information, for the mobile applications of the ATISCOM project. This model is based on client/server architecture, to reduce the heavy computations on a mobile device by sending data from the mobile device to the server for remote processing (i.e., offloading) of the predictions. We then gradually optimized our proposed model for better classification of the newly installed applications on Android devices. We at first adopted Naive Bayes to build the model with 92.4486% accuracy, then the classification method that gave the best accuracy of 93.85% for stochastic gradient descent (SGD) with binary class (i.e., malware and benign), and finally the regression method with numerical values ranging from −100 to 100 to manage the uncertainty predictions. Therefore, our proposed model with random forest regression gives a good accuracy in terms of performance, with a good correlation coefficient, minimum computation time and the smallest number of errors for malware detection.
]]>Authors: Sandip Dutta
With the rapid development of the autonomous world, local decision making between devices is becoming important. This article provides a new paradigm (Rock-Paper-Scissors-Hammer: RPSH) that can reduce the number of conflicts or decision draws and thus increase the throughput of autonomous devices while reducing the kept number of records or transactions. The paradigm requires a sealed envelope protocol and sequential message passing between both parties to decide unanimously a winner between the two participants without a third-party mediation. The message passing proposes a detailed record in a blockchain-like format that is not corruptible and is verifiable for conflict resolution. A simulated IoT environment is created to show the advantage of the proposed protocol and it shows significant reduction in mean efforts due to the elimination of draws or undecided situations. Autonomous devices, such as cars, need to maintain meticulous, lightweight, but blockchain-like record keeping for insurance settlements or conflict resolutions; that archival data size is significantly reduced by the RPSH protocol.
]]>Authors: Lorenzo Bracciale Pierpaolo Loreti Claudio Pisa Alex Shahidi
The Internet of Things offers a wide range of possibilities that can be exploited more or less explicitly for user authentication, ranging from specifically designed systems including biometric devices to environmental sensors that can be opportunistically used to feed behavioural authentication systems. How to integrate all this information in a reliable way to get a continuous authentication service presents several open challenges. Among these: how to combine semi-trusted information coming from non-tamper-proof sensors, where to store such data avoiding a single point of failure, how to analyse data in a distributed way, which interface to use to provide an authentication service to a multitude of different services and applications. In this paper, we present a Blockchain-based architectural solution of a distributed system able to transform IoT interactions into useful data for an authentication system. The design includes: (i) a security procedure to certify users’ positions and identities, (ii) a secure storage to hold this information, and (iii) a service to dynamically assign a trust level to a user’s position. We call this system “Secure Path”.
]]>Authors: Shensheng Tang Yi Xie
Internet of Things (IoT) is improving human life in a more convenient and simpler way. One of the most promising IoT applications is healthcare. In this paper, an availability model of a healthcare IoT system is proposed which is composed of two groups of structures described by separate Markov state-space models. The two separate models are analyzed and combined to implement the whole IoT system modeling. The system balance equations are solved under a given scenario and some performance metrics of interest, such as probabilities of full service, degraded service, and the system unavailability, are derived. Detailed numerical evaluation of selected metrics is provided for further understanding and verification of the analytic results. An availability performance improving (API) method is also proposed for increasing the probability of system full service and decreasing the system unavailability. The proposed system modeling and performance improving method can serve as a useful reference for general IoT system design and evaluation.
]]>Authors: Muhammad Uzar Ali Bhupesh Kumar Mishra Dhavalkumar Thakker Suvodeep Mazumdar Sydney Simpson
A key aspect of the development of Smart Cities involves the efficient and effective management of resources to improve liveability. Achieving this requires large volumes of sensors strategically deployed across urban areas. In many cases, however, it is not feasible to install devices in remote and inaccessible areas, resulting in incomplete data coverage. In such situations, citizens can often play a crucial role in filling this data collection gap. A popular complimentary science to traditional sensor-based data collection is to design Citizen Science (CS) activities in collaboration with citizens and local communities. Such activities are also designed with a feedback loop where the Citizens benefit from their participation by gaining a greater sense of awareness of their local issues while also influencing how the activities can align best with their local contexts. The participation and engagement of citizens are vital and yet often a real challenge in ensuring the long-term continuity of CS projects. In this paper, we explore engagement factors, factors that help keeping engagement high, in technology-centric CS projects where technology is a key enabler to support CS activities. We outline a literature review of exploring and understanding various motivational and engagement factors that influence the participation of citizens in technology-driven CS activities. Based on this literature, we present a mobile-based flood monitoring citizen science application aimed at supporting data collection activities in a real-world CS project as part of an EU project. We discuss the results of a user evaluation of this app, and finally discuss our findings within the context of citizens’ engagement.
]]>Authors: Ghassan Fadlallah Djamal Rebaine Hamid Mcheick
Smart, pervasive devices have recently experienced accelerated technological development in the fields of hardware, software, and wireless connections. The promotion of various kinds of collaborative mobile computing requires an upgrade in network connectivity with wireless technologies, as well as enhanced peer-to-peer communication. Mobile computing also requires appropriate scheduling methods to speed up the implementation and processing of various computing applications by better managing network resources. Scheduling techniques are relevant to the modern architectural models that support the IoT paradigm, particularly smart collaborative mobile computing architectures at the network periphery. In this regard, load-balancing techniques have also become necessary to exploit all the available capabilities and thus the speed of implementation. However, since the problem of scheduling and load-balancing, which we addressed in this study, is known to be NP-hard, the heuristic approach is well justified. We thus designed and validated a greedy scheduling and load-balancing algorithm to improve the utilization of resources. We conducted a comparison study with the longest cloudlet fact processing (LCFP), shortest cloudlet fact processing (SCFP), and Min-Min heuristic algorithms. The choice of those three algorithms is based on the efficiency and simplicity of their mechanisms, as reported in the literature, for allocating tasks to devices. The simulation we conducted showed the superiority of our approach over those algorithms with respect to the overall completion time criterion.
]]>Authors: Andrew John Poulter Simon J. Cox
Internet of Things (IoT) devices are becoming ubiquitous, and may be arranged to form formal or ad hoc Command and Control (C2) networks. Such networks typically do not have a mechanism to facilitate the sharing of either data or control inputs. This paper examines this problem in the context of IoT devices operating within C2 systems which do not have a trusted relationship with each other. We propose a solution which we call syndication, to provide a controlled mechanism to share data between C2 systems of devices without a fully trusted relationship. This paper builds upon previous work which established a lightweight protocol for secure C2 operations within the IoT. Using the proposed approach enables not only sharing of data but also permits the external controller to submit moderated requests for actions to be performed. The paper concludes by examining how this approach could also be adopted to provide secure guest access to connected systems in a domestic or commercial context.
]]>Authors: Guillaume Coiffier Ghouthi Boukli Hacene Vincent Gripon
Deep Neural Networks are state-of-the-art in a large number of challenges in machine learning. However, to reach the best performance they require a huge pool of parameters. Indeed, typical deep convolutional architectures present an increasing number of feature maps as we go deeper in the network, whereas spatial resolution of inputs is decreased through downsampling operations. This means that most of the parameters lay in the final layers, while a large portion of the computations are performed by a small fraction of the total parameters in the first layers. In an effort to use every parameter of a network at its maximum, we propose a new convolutional neural network architecture, called ThriftyNet. In ThriftyNet, only one convolutional layer is defined and used recursively, leading to a maximal parameter factorization. In complement, normalization, non-linearities, downsamplings and shortcut ensure sufficient expressivity of the model. ThriftyNet achieves competitive performance on a tiny parameters budget, exceeding 91% accuracy on CIFAR-10 with less than 40 k parameters in total, 74.3% on CIFAR-100 with less than 600 k parameters, and 67.1% On ImageNet ILSVRC 2012 with no more than 4.15 M parameters. However, the proposed method typically requires more computations than existing counterparts.
]]>Authors: Yustus Eko Oktian Elizabeth Nathania Witanto Sang-Gon Lee
Since the inception of the Internet of Things (IoT), we have adopted centralized architecture for decades. With the vastly growing number of IoT devices and gateways, this architecture struggles to cope with the high demands of state-of-the-art IoT services, which require scalable and responsive infrastructure. In response, decentralization becomes a considerable interest among IoT adopters. Following a similar trajectory, this paper introduces an IoT architecture re-work that enables three spheres of IoT workflows (i.e., computing, storage, and networking) to be run in a distributed manner. In particular, we employ the blockchain and smart contract to provide a secure computing platform. The distributed storage network maintains the saving of IoT raw data and application data. The software-defined networking (SDN) controllers and SDN switches exist in the architecture to provide connectivity across multiple IoT domains. We envision all of those services in the form of separate yet integrated peer-to-peer (P2P) overlay networks, which IoT actors such as IoT domain owners, IoT users, Internet Service Provider (ISP), and government can cultivate. We also present several IoT workflow examples showing how IoT developers can adapt to this new proposed architecture. Based on the presented workflows, the IoT computing can be performed in a trusted and privacy-preserving manner, the IoT storage can be made robust and verifiable, and finally, we can react to the network events automatically and quickly. Our discussions in this paper can be beneficial for many people ranging from academia, industries, and investors that are interested in the future of IoT in general.
]]>Authors: Kashif Zia Umar Farooq Muhammad Shafi Muhammad Arshad
The things in the Internet of Things are becoming more and more socially aware. What social means for these things (more often termed as “social objects”) is predominately determined by how and when objects interact with each other. In this paper, an agent-based model for Social Internet of Things is proposed, which features the realization of various interaction modalities, along with possible network structures and mobility modes, thus providing a novel model to ask interesting “what-if” questions. The scenario used, which is the acquisition of shared resources in a common spatial and temporal world, demands agents to have ad-hoc communication and a willingness to cooperate with others. The model was simulated for all possible combinations of input parameters to study the implications of competitive vs. cooperative social behavior while agents try to acquire shared resources/services in a peer-to-peer fashion. However, the main focus of the paper was to analyze the impact of profile-based mobility, which has an underpinning on parameters of extent and scale of a mobility profile. The simulation results, in addition to others, reveal that there are substantial and systematic differences among different combinations of values for extent and scale.
]]>Authors: Konstantinos Tsiknas Dimitrios Taketzis Konstantinos Demertzis Charalabos Skianis
In today’s Industrial Internet of Things (IIoT) environment, where different systems interact with the physical world, the state proposed by the Industry 4.0 standards can lead to escalating vulnerabilities, especially when these systems receive data streams from multiple intermediaries, requiring multilevel security approaches, in addition to link encryption. At the same time taking into account the heterogeneity of the systems included in the IIoT ecosystem and the non-institutionalized interoperability in terms of hardware and software, serious issues arise as to how to secure these systems. In this framework, given that the protection of industrial equipment is a requirement inextricably linked to technological developments and the use of the IoT, it is important to identify the major vulnerabilities and the associated risks and threats and to suggest the most appropriate countermeasures. In this context, this study provides a description of the attacks against IIoT systems, as well as a thorough analysis of the solutions for these attacks, as they have been proposed in the most recent literature.
]]>Authors: Hung Nguyen-An Thomas Silverston Taku Yamazaki Takumi Miyoshi
We now use the Internet of things (IoT) in our everyday lives. The novel IoT devices collect cyber–physical data and provide information on the environment. Hence, IoT traffic will count for a major part of Internet traffic; however, its impact on the network is still widely unknown. IoT devices are prone to cyberattacks because of constrained resources or misconfigurations. It is essential to characterize IoT traffic and identify each device to monitor the IoT network and discriminate among legitimate and anomalous IoT traffic. In this study, we deployed a smart-home testbed comprising several IoT devices to study IoT traffic. We performed extensive measurement experiments using a novel IoT traffic generator tool called IoTTGen. This tool can generate traffic from multiple devices, emulating large-scale scenarios with different devices under different network conditions. We analyzed the IoT traffic properties by computing the entropy value of traffic parameters and visually observing the traffic on behavior shape graphs. We propose a new method for identifying traffic entropy-based devices, computing the entropy values of traffic features. The method relies on machine learning to classify the traffic. The proposed method succeeded in identifying devices with a performance accuracy up to 94% and is robust with unpredictable network behavior with traffic anomalies spreading in the network.
]]>Authors: Keison Tang Arjun Kumar Muhammad Nadeem Issam Maaz
Sleep pattern and posture recognition have become of great interest for a diverse range of clinical applications. Autonomous and constant monitoring of sleep postures provides useful information for reducing the health risk. Prevailing systems are designed based on electrocardiograms, cameras, and pressure sensors, which are not only expensive but also intrusive in nature, and uncomfortable to use. We propose an unobtrusive and affordable smart system based on an electronic mat called Sleep Mat-e for monitoring the sleep activity and sleep posture of individuals living in residential care facilities. The system uses a pressure sensing mat constructed using piezo-resistive material to be placed on a mattress. The sensors detect the distribution of the body pressure on the mat during sleep and we use convolution neural network (CNN) to analyze collected data and recognize different sleeping postures. The system is capable of recognizing the four major postures—face-up, face-down, right lateral, and left lateral. A real-time feedback mechanism is also provided through an accompanying smartphone application for keeping a diary of the posture and send alert to the user in case there is a danger of falling from bed. It also produces synopses of postures and activities over a given duration of time. Finally, we conducted experiments to evaluate the accuracy of the prototype, and the proposed system achieved a classification accuracy of around 90%.
]]>Authors: Hossein Chegini Ranesh Kumar Naha Aniket Mahanti Parimala Thulasiraman
The number of IoT sensors and physical objects accommodated on the Internet is increasing day by day, and traditional Cloud Computing would not be able to host IoT data because of its high latency. Being challenged of processing all IoT big data on Cloud facilities, there is not enough study on automating components to deal with the big data and real-time tasks in the IoT–Fog–Cloud ecosystem. For instance, designing automatic data transfer from the fog layer to cloud layer, which contains enormous distributed devices is challenging. Considering fog as the supporting processing layer, dealing with decentralized devices in the IoT and fog layer leads us to think of other automatic mechanisms to manage the existing heterogeneity. The big data and heterogeneity challenges also motivated us to design other automatic components for Fog resiliency, which we address as the third challenge in the ecosystem. Fog resiliency makes the processing of IoT tasks independent to the Cloud layer. This survey aims to review, study, and analyze the automatic functions as a taxonomy to help researchers, who are implementing methods and algorithms for different IoT applications. We demonstrated the automatic functions through our research in accordance to each challenge. The study also discusses and suggests automating the tasks, methods, and processes of the ecosystem that still process the data manually.
]]>Authors: Rameez Asif
The latest quantum computers have the ability to solve incredibly complex classical cryptography equations particularly to decode the secret encrypted keys and making the network vulnerable to hacking. They can solve complex mathematical problems almost instantaneously compared to the billions of years of computation needed by traditional computing machines. Researchers advocate the development of novel strategies to include data encryption in the post-quantum era. Lattices have been widely used in cryptography, somewhat peculiarly, and these algorithms have been used in both; (a) cryptoanalysis by using lattice approximation to break cryptosystems; and (b) cryptography by using computationally hard lattice problems (non-deterministic polynomial time hardness) to construct stable cryptographic functions. Most of the dominant features of lattice-based cryptography (LBC), which holds it ahead in the post-quantum league, include resistance to quantum attack vectors, high concurrent performance, parallelism, security under worst-case intractability assumptions, and solutions to long-standing open problems in cryptography. While these methods offer possible security for classical cryptosytems in theory and experimentation, their implementation in energy-restricted Internet-of-Things (IoT) devices requires careful study of regular lattice-based implantation and its simplification in lightweight lattice-based cryptography (LW-LBC). This streamlined post-quantum algorithm is ideal for levelled IoT device security. The key aim of this survey was to provide the scientific community with comprehensive information on elementary mathematical facts, as well as to address real-time implementation, hardware architecture, open problems, attack vectors, and the significance for the IoT networks.
]]>Authors: Claudio Marche Michele Nitti
The IoT is transforming the ordinary physical objects around us into an ecosystem of information that will enrich our lives. The key to this ecosystem is the cooperation among the devices, where things look for other things to provide composite services for the benefit of human beings. However, cooperation among nodes can only arise when nodes trust the information received by any other peer in the system. Previous efforts on trust were concentrated on proposing models and algorithms to manage the level of trustworthiness. In this paper, we focus on modelling the interaction between trustor and trustee in the IoT and on proposing guidelines to efficiently design trust management models. Simulations show the impacts of the proposed guidelines on a simple trust model.
]]>Authors: Alket Cecaj Marco Lippi Marco Mamei Franco Zambonelli
The possibility of sensing and predicting the movements of crowds in modern cities is of fundamental importance for improving urban planning, urban mobility, urban safety, and tourism activities. However, it also introduces several challenges at the level of sensing technologies and data analysis. The objective of this survey is to overview: (i) the many potential application areas of crowd sensing and prediction; (ii) the technologies that can be exploited to sense crowd along with their potentials and limitations; (iii) the data analysis techniques that can be effectively used to forecast crowd distribution. Finally, the article tries to identify open and promising research challenges.
]]>Authors: Philip Knight Cai Bird Alex Sinclair Jonathan Higham Andy Plater
A low-cost “Internet of Things” (IoT) tide gauge network was developed to provide real-time and “delayed mode” sea-level data to support monitoring of spatial and temporal coastal morphological changes. It is based on the Arduino Sigfox MKR 1200 micro-controller platform with a Measurement Specialties pressure sensor (MS5837). Experiments at two sites colocated with established tide gauges show that these inexpensive pressure sensors can make accurate sea-level measurements. While these pressure sensors are capable of ~1 cm accuracy, as with other comparable gauges, the effect of significant wave activity can distort the overall sea-level measurements. Various off-the-shelf hardware and software configurations were tested to provide complementary data as part of a localized network and to overcome operational constraints, such as lack of suitable infrastructure for mounting the tide gauges and for exposed beach locations.
]]>Authors: Diego Mendez Mena Baijian Yang
Security presents itself as one of the biggest threats to the enabling and the deployment of the Internet of Things (IoT). Security challenges are evident in light of recent cybersecurity attacks that targeted major internet service providers and crippled a significant portion of the entire Internet by taking advantage of faulty and ill-protected embedded devices. Many of these devices reside at home networks with user-administrators who are not familiar with network security best practices, making them easy targets for the attackers. Therefore, security solutions are needed to navigate the insecure and untrusted public networks by automating protections through affordable and accessible first-hand network information sharing. This paper proposes and implements a proof of concept (PoC) to secure Internet Service Providers (ISPs), home networks, and home-based IoT devices using blockchain technologies. The results obtained support the idea of a distributed cyber threat intelligence data sharing network capable of protecting various stakeholders.
]]>