scholarly journals Enabling End-to-End Secure Connectivity for Low-Power IoT Devices with UAVs

Author(s):  
Archana Rajakaruna ◽  
Ahsan Manzoor ◽  
Pawani Porambage ◽  
Madhusanka Liyanage ◽  
Mika Ylianttila ◽  
...  
Author(s):  
Ace Dimitrievski ◽  
Sonja Filiposka ◽  
Francisco José Melero ◽  
Eftim Zdravevski ◽  
Petre Lameski ◽  
...  

Connected health is expected to introduce an improvement in providing healthcare and doctor-patient communication while at the same time reducing cost. Connected health would introduce an even more significant gap between healthcare quality for urban areas with physical proximity and better communication to providers and the portion of rural areas with numerous connectivity issues. We identify these challenges using user scenarios and propose LoRa based architecture for addressing these challenges. We focus on the energy management of battery-powered, affordable IoT devices for long-term operation, providing important information about the care receivers’ well-being. Using an external ultra-low-power timer, we extended the battery life in the order of tens of times, compared to relying on low power modes of the microcontroller.


Symmetry ◽  
2020 ◽  
Vol 12 (4) ◽  
pp. 552 ◽  
Author(s):  
Rocksan Choi ◽  
SeungGwan Lee ◽  
Sungwon Lee

In our modern world, many Internet of Things (IoT) technologies are being researched and developed. IoT devices are currently being used in many fields. IoT devices use Wi-Fi and Bluetooth, however, communication distance is short and battery consumption is high. In areas such as smart cities and smart farms, IoT technology is needed to support a wide coverage with low power consumption. Low Power Wide Area (LPWA), which is a transmission used in IoT supporting a wide area with low power consumption, has evolved. LPWA includes Long Range (LoRa), Narrowband (NB-IoT), and Sigfox. LoRa offers many benefits as it communicates the longest distances, is cheap and consumes less battery. LoRa is used in many countries and covers a range of hundreds of square kilometers (km2) with a single gateway. However, if there are many obstacles to smart cities and smart farms, it causes communication problems. This paper proposes two (2) solutions to this problem: the relay method which is a multi-hop method and the Automatic Repeat Request (ARQ) system that detects packet loss in real-time and requests retransmission for LoRa. In this study, the actual performance of LoRa in the problematic environment was measured and the proposed method was applied. It was confirmed that the transmission rate of LoRa dropped when there were many obstacles such as trees. To use LoRa in a smart farm with a lot of space, multi-hop was observed to be better. An ARQ system is needed to compensate for the unexpected drop in the forward rate due to the increase in IoT devices. This research focused on reliability, however, additional network methods and automatic repeat request (ARQ) systems considering battery time should be researched in symmetry. This study covers the interdisciplinary field of computer science and wireless low power communication engineering. We have analyzed the LoRa/LoRaWAN technology in an experimental approach, which has been somewhat less studied than cellular network or WiFi technology. In addition, we presented and improved the performance evaluation results in consideration of various local and climatic environments.


Author(s):  
Hamza Sajjad Ahmad ◽  
Muhammad Junaid Arshad ◽  
Muhammad Sohail Akram

To send data over the network, devices need to authenticate themselves within the network. After authentication, the device will be able to send the data in-network. After authentication, secure communication of devices is an important task that is done with an encryption method. IoT network devices have a very small circuit with low resources and low computation power. By considering low power, less memory, low computation, and all the aspect of IoT devices, an encryption technique is needed that is suitable for this type of device. As IoT networks are heterogeneous, each device has different hardware properties, and all the devices are not on one scale. To make IoT networks secure, this paper starts with the secure authentication mechanism to verify the device that wants to be a part of the network. After that, an encryption algorithm is presented that will make the communication secure. This encryption algorithm is designed by considering all the important aspects of IoT devices (low computation, low memory, and cost).


2018 ◽  
Vol 12 (3) ◽  
pp. 2385-2394 ◽  
Author(s):  
Pei-Yih Ting ◽  
Jia-Lun Tsai ◽  
Tzong-Sun Wu

2021 ◽  
Author(s):  
Eduardo De Oliveira Burger Monteiro Luiz ◽  
Alessandro Copetti ◽  
Luciano Bertini ◽  
Juliano Fontoura Kazienko

The introduction of the IPv6 protocol solved the problem of providingaddresses to network devices. With the emergence of the Internetof Things (IoT), there was also the need to develop a protocolthat would assist in connecting low-power devices. The 6LoWPANprotocols were created for this purpose. However, such protocolsinherited the vulnerabilities and threats related to Denial of Service(DoS) attacks from the IPv4 and IPv6 protocols. In this paper, weprepare a network environment for low-power IoT devices usingCOOJA simulator and Contiki operating system to analyze theenergy consumption of devices. Besides, we propose an IntrusionDetection System (IDS) associated with the AES symmetric encryptionalgorithm for the detection of reflection DoS attacks. Thesymmetric encryption has proven to be an appropriate methoddue to low implementation overhead, not incurring in large powerconsumption, and keeping a high level of system security. The maincontributions of this paper are: (i) implementation of a reflectionattack algorithm for IoT devices; (ii) implementation of an intrusiondetection system using AES encryption; (iii) comparison ofthe power consumption in three distinct scenarios: normal messageexchange, the occurrence of a reflection attack, and runningIDS algorithm. Finally, the results presented show that the IDSwith symmetric cryptography meets the security requirements andrespects the energy limits of low-power sensors.


2020 ◽  
Vol 10 (18) ◽  
pp. 6347
Author(s):  
Borja Pozo ◽  
José Ángel Araujo ◽  
Henrik Zessin ◽  
Loreto Mateu ◽  
José Ignacio Garate ◽  
...  

Wind energy harvesting is a widespread mature technology employed to collect energy, but it is also suitable, and not yet fully exploited at small scale, for powering low power electronic systems such as Internet of Things (IoT) systems like structural health monitoring, on-line sensors, predictive maintenance, manufacturing processes and surveillance. The present work introduces a three-phase mini wind energy harvester and an Alternate Current/Direct Current (AC/DC) converter. The research analyzes in depth a wind harvester’s operation principles in order to extract its characteristic parameters. It also proposes an equivalent electromechanical model of the harvester, and its accuracy has been verified with prototype performance results. Moreover, unlike most of the converters which use two steps for AC/DC signal conditioning—a rectifier stage and a DC/DC regulator—this work proposes a single stage converter to increase the system efficiency and, consequently, improve the energy transfer. Moreover, the most suitable AC/DC converter architecture was chosen and optimized for the best performance taking into account: the target power, efficiency, voltage levels, operation frequency, duty cycle and load required to implement the aforementioned converter.


Author(s):  
Xiaojun Guo ◽  
Yukun Huang ◽  
Linrun Feng ◽  
Sujie Chen ◽  
Jiaqing Zhao ◽  
...  

2020 ◽  
Vol 2020 ◽  
pp. 1-17
Author(s):  
John Foley ◽  
Naghmeh Moradpoor ◽  
Henry Ochenyi

One of the important features of routing protocol for low-power and lossy networks (RPLs) is objective function (OF). OF influences an IoT network in terms of routing strategies and network topology. On the contrary, detecting a combination of attacks against OFs is a cutting-edge technology that will become a necessity as next generation low-power wireless networks continue to be exploited as they grow rapidly. However, current literature lacks study on vulnerability analysis of OFs particularly in terms of combined attacks. Furthermore, machine learning is a promising solution for the global networks of IoT devices in terms of analysing their ever-growing generated data and predicting cyberattacks against such devices. Therefore, in this paper, we study the vulnerability analysis of two popular OFs of RPL to detect combined attacks against them using machine learning algorithms through different simulated scenarios. For this, we created a novel IoT dataset based on power and network metrics, which is deployed as part of an RPL IDS/IPS solution to enhance information security. Addressing the captured results, our machine learning approach is successful in detecting combined attacks against two popular OFs of RPL based on the power and network metrics in which MLP and RF algorithms are the most successful classifier deployment for single and ensemble models.


Sign in / Sign up

Export Citation Format

Share Document