FPGA-Accelerated Time Series Mining on Low-Power IoT Devices

Author(s):  
Seongyoung Kang ◽  
Jinyeong Moon ◽  
Sang-Woo Jun
Author(s):  
Ace Dimitrievski ◽  
Sonja Filiposka ◽  
Francisco José Melero ◽  
Eftim Zdravevski ◽  
Petre Lameski ◽  
...  

Connected health is expected to introduce an improvement in providing healthcare and doctor-patient communication while at the same time reducing cost. Connected health would introduce an even more significant gap between healthcare quality for urban areas with physical proximity and better communication to providers and the portion of rural areas with numerous connectivity issues. We identify these challenges using user scenarios and propose LoRa based architecture for addressing these challenges. We focus on the energy management of battery-powered, affordable IoT devices for long-term operation, providing important information about the care receivers’ well-being. Using an external ultra-low-power timer, we extended the battery life in the order of tens of times, compared to relying on low power modes of the microcontroller.


2021 ◽  
Vol 13 (9) ◽  
pp. 4716
Author(s):  
Moustafa M. Nasralla

To develop sustainable rehabilitation systems, these should consider common problems on IoT devices such as low battery, connection issues and hardware damages. These should be able to rapidly detect any kind of problem incorporating the capacity of warning users about failures without interrupting rehabilitation services. A novel methodology is presented to guide the design and development of sustainable rehabilitation systems focusing on communication and networking among IoT devices in rehabilitation systems with virtual smart cities by using time series analysis for identifying malfunctioning IoT devices. This work is illustrated in a realistic rehabilitation simulation scenario in a virtual smart city using machine learning on time series for identifying and anticipating failures for supporting sustainability.


Symmetry ◽  
2020 ◽  
Vol 12 (4) ◽  
pp. 552 ◽  
Author(s):  
Rocksan Choi ◽  
SeungGwan Lee ◽  
Sungwon Lee

In our modern world, many Internet of Things (IoT) technologies are being researched and developed. IoT devices are currently being used in many fields. IoT devices use Wi-Fi and Bluetooth, however, communication distance is short and battery consumption is high. In areas such as smart cities and smart farms, IoT technology is needed to support a wide coverage with low power consumption. Low Power Wide Area (LPWA), which is a transmission used in IoT supporting a wide area with low power consumption, has evolved. LPWA includes Long Range (LoRa), Narrowband (NB-IoT), and Sigfox. LoRa offers many benefits as it communicates the longest distances, is cheap and consumes less battery. LoRa is used in many countries and covers a range of hundreds of square kilometers (km2) with a single gateway. However, if there are many obstacles to smart cities and smart farms, it causes communication problems. This paper proposes two (2) solutions to this problem: the relay method which is a multi-hop method and the Automatic Repeat Request (ARQ) system that detects packet loss in real-time and requests retransmission for LoRa. In this study, the actual performance of LoRa in the problematic environment was measured and the proposed method was applied. It was confirmed that the transmission rate of LoRa dropped when there were many obstacles such as trees. To use LoRa in a smart farm with a lot of space, multi-hop was observed to be better. An ARQ system is needed to compensate for the unexpected drop in the forward rate due to the increase in IoT devices. This research focused on reliability, however, additional network methods and automatic repeat request (ARQ) systems considering battery time should be researched in symmetry. This study covers the interdisciplinary field of computer science and wireless low power communication engineering. We have analyzed the LoRa/LoRaWAN technology in an experimental approach, which has been somewhat less studied than cellular network or WiFi technology. In addition, we presented and improved the performance evaluation results in consideration of various local and climatic environments.


Author(s):  
Hamza Sajjad Ahmad ◽  
Muhammad Junaid Arshad ◽  
Muhammad Sohail Akram

To send data over the network, devices need to authenticate themselves within the network. After authentication, the device will be able to send the data in-network. After authentication, secure communication of devices is an important task that is done with an encryption method. IoT network devices have a very small circuit with low resources and low computation power. By considering low power, less memory, low computation, and all the aspect of IoT devices, an encryption technique is needed that is suitable for this type of device. As IoT networks are heterogeneous, each device has different hardware properties, and all the devices are not on one scale. To make IoT networks secure, this paper starts with the secure authentication mechanism to verify the device that wants to be a part of the network. After that, an encryption algorithm is presented that will make the communication secure. This encryption algorithm is designed by considering all the important aspects of IoT devices (low computation, low memory, and cost).


Author(s):  
R. Scrivani ◽  
R. R. V. Goncalves ◽  
L. A. S. Romani ◽  
S. R. M. Oliveira ◽  
E. D. Assad

2018 ◽  
Vol 12 (3) ◽  
pp. 2385-2394 ◽  
Author(s):  
Pei-Yih Ting ◽  
Jia-Lun Tsai ◽  
Tzong-Sun Wu

T-Comm ◽  
2020 ◽  
Vol 14 (12) ◽  
pp. 45-50
Author(s):  
Mikhail E. Sukhoparov ◽  
◽  
Ilya S. Lebedev ◽  

The development of IoT concept makes it necessary to search and improve models and methods for analyzing the state of remote autonomous devices. Due to the fact that some devices are located outside the controlled area, it becomes necessary to develop universal models and methods for identifying the state of low-power devices from a computational point of view, using complex approaches to analyzing data coming from various information channels. The article discusses an approach to identifying IoT devices state, based on parallel functioning classifiers that process time series received from elements in various states and modes of operation. The aim of the work is to develop an approach for identifying the state of IoT devices based on time series recorded during the execution of various processes. The proposed solution is based on methods of parallel classification and statistical analysis, requires an initial labeled sample. The use of several classifiers that give an answer "independently" from each other makes it possible to average the error by "collective" voting. The developed approach is tested on a sequence of classifying algorithms, to the input of which the time series obtained experimentally under various operating conditions were fed. Results are presented for a naive Bayesian classifier, decision trees, discriminant analysis, and the k nearest neighbors method. The use of a sequence of classification algorithms operating in parallel allows scaling by adding new classifiers without losing processing speed. The method makes it possible to identify the state of the Internet of Things device with relatively small requirements for computing resources, ease of implementation, and scalability by adding new classifying algorithms.


2021 ◽  
Author(s):  
Eduardo De Oliveira Burger Monteiro Luiz ◽  
Alessandro Copetti ◽  
Luciano Bertini ◽  
Juliano Fontoura Kazienko

The introduction of the IPv6 protocol solved the problem of providingaddresses to network devices. With the emergence of the Internetof Things (IoT), there was also the need to develop a protocolthat would assist in connecting low-power devices. The 6LoWPANprotocols were created for this purpose. However, such protocolsinherited the vulnerabilities and threats related to Denial of Service(DoS) attacks from the IPv4 and IPv6 protocols. In this paper, weprepare a network environment for low-power IoT devices usingCOOJA simulator and Contiki operating system to analyze theenergy consumption of devices. Besides, we propose an IntrusionDetection System (IDS) associated with the AES symmetric encryptionalgorithm for the detection of reflection DoS attacks. Thesymmetric encryption has proven to be an appropriate methoddue to low implementation overhead, not incurring in large powerconsumption, and keeping a high level of system security. The maincontributions of this paper are: (i) implementation of a reflectionattack algorithm for IoT devices; (ii) implementation of an intrusiondetection system using AES encryption; (iii) comparison ofthe power consumption in three distinct scenarios: normal messageexchange, the occurrence of a reflection attack, and runningIDS algorithm. Finally, the results presented show that the IDSwith symmetric cryptography meets the security requirements andrespects the energy limits of low-power sensors.


Sign in / Sign up

Export Citation Format

Share Document