scholarly journals Cloud-based platforms for LoRa internet of things: a survey

Author(s):  
Mouna Gassara ◽  
Manel Elleuchi ◽  
Mohamed Abid

<span><span>Internet of Things</span> (IoT) establishes a smart communication system between the human being and the surrounding objects (or “things”) while using the internet as the backbone of this system. Cloud is the fundamental constituent of IoT. It offers important application services in numerous <span>application domains</span>. Indeed, many IoT cloud platforms are competing to provide appropriate and very specific IoT services. The LoRa platform in particular presents a long-range, low-bit rate, low-power, wireless telecommunication protocol for IoT. As such, end-devices make use of LoRa through a sole wireless hop in order to communicate to the gateway(s) that is (are) considered as relay messages and transparent bridges between these end-devices and an IoT cloud while connecting to the Internet. This article surveys the most used IoT <span>cloud platforms</span> suitable for the LoRa communication protocol through a deep and detailed study of previously published works related to this topic. Moreover, a comparison is made between these IoT cloud platforms according to their characteristics and application domains. The overall aim of the present paper is to provide researchers in the field with detailed knowledge concerning the IoT <span>cloud platforms appropriate to the LoRa communication system </span>including the advantages and drawbacks of each one of them.</span>

Sensors ◽  
2016 ◽  
Vol 16 (9) ◽  
pp. 1466 ◽  
Author(s):  
Aloÿs Augustin ◽  
Jiazi Yi ◽  
Thomas Clausen ◽  
William Townsley

Author(s):  
Elly Mufida ◽  
David Wardana Agus Rahayu

The VoIP communication system at OMNI Hospital Alam Sutera uses the Elastix 2.5 server with the Centos 5.11 operating system. Elastix 2.5 by the developer has been declared End of Life. The server security system is a serious concern considering that VoIP servers can be accessed from the internet. Iptables and fail2ban applications are applications that are used to limit and counteract those who try to attack the VoIP server. One application that can be used as an open source VoIP server is the Issabel Application version 4.0. The migration process from Elastix 2.5 application to Issabel 4.0 by backing up all configurations in the Elastix 2.5 application through a web browser including the configuration of endpoints, fax, e-mail, asterisk. After the backup file is downloaded then upload the backup file to the Issabel 4.0 application then run the migration process. Adding a backup path as a failover connection is needed because the VoIP communication protocol between the OMNI Hospitals Group still uses one path so that when there is a problem in the connection path, the communication protocol will stop. The tunnel EoIP is a protocol used as a backup path between the OMNI Hospitals Group site.


Technologies ◽  
2021 ◽  
Vol 9 (1) ◽  
pp. 22
Author(s):  
Eljona Zanaj ◽  
Giuseppe Caso ◽  
Luca De Nardis ◽  
Alireza Mohammadpour ◽  
Özgü Alay ◽  
...  

In the last years, the Internet of Things (IoT) has emerged as a key application context in the design and evolution of technologies in the transition toward a 5G ecosystem. More and more IoT technologies have entered the market and represent important enablers in the deployment of networks of interconnected devices. As network and spatial device densities grow, energy efficiency and consumption are becoming an important aspect in analyzing the performance and suitability of different technologies. In this framework, this survey presents an extensive review of IoT technologies, including both Low-Power Short-Area Networks (LPSANs) and Low-Power Wide-Area Networks (LPWANs), from the perspective of energy efficiency and power consumption. Existing consumption models and energy efficiency mechanisms are categorized, analyzed and discussed, in order to highlight the main trends proposed in literature and standards toward achieving energy-efficient IoT networks. Current limitations and open challenges are also discussed, aiming at highlighting new possible research directions.


2019 ◽  
Vol 11 (3) ◽  
pp. 57 ◽  
Author(s):  
Lorenzo Vangelista ◽  
Marco Centenaro

The low-power wide-area network (LPWAN) paradigm is gradually gaining market acceptance. In particular, three prominent LPWAN technologies are emerging at the moment: LoRaWAN™ and SigFox™, which operate on unlicensed frequency bands, and NB-IoT, operating on licensed frequency bands. This paper deals with LoRaWAN™, and has the aim of describing a particularly interesting feature provided by the latest LoRaWAN™ specification—often neglected in the literature—i.e., the roaming capability between different operators of LoRaWAN™ networks, across the same country or even different countries. Recalling that LoRaWAN™ devices do not have a subscriber identification module (SIM) like cellular network terminals, at a first glance the implementation of roaming in LoRaWAN™ networks could seem intricate. The contribution of this paper consists in explaining the principles behind the implementation of a global LoRaWAN network, with particular focus on how to cope with the lack of the SIM in the architecture and how to realize roaming.


2021 ◽  
Vol 13 (1) ◽  
pp. 26-32
Author(s):  
Satrio Yudho

The manner of efficiency and effective of power usage is the main objective in electricity consumption, one major steps to control the usage is by providing a monitoring to aim the power usage data and process it to information needed. Internet of Things benefit in power and electricity has involved sensors to work as data reader continuously.  LoRa or well known as Long Range radio communication system work with chirp spread spectrum which work from 920 to 923 Mhz in Indonesia. This paper presents implementation of LoRa system to support the prototype of energy monitoring in Solar Home System off-grid


Author(s):  
Olof Magnusson ◽  
Rikard Teodorsson ◽  
Joakim Wennerberg ◽  
Stig Arne Knoph

LoRaWAN (long-range wide-area network) is an emerging technology for the connection of internet of things (IoT) devices to the internet and can as such be an important part of decision support systems. In this technology, IoT devices are connected to the internet through gateways by using long-range radio signals. However, because LoRaWAN is an open network, anyone has the ability to connect an end device or set up a gateway. Thus, it is important that gateways are designed in such a way that their ability to be used maliciously is limited. This chapter covers relevant attacks against gateways and potential countermeasures against them. A number of different attacks were found in literature, including radio jamming, eavesdropping, replay attacks, and attacks against the implementation of what is called beacons in LoRaWAN. Countermeasures against these attacks are discussed, and a suggestion to improve the security of LoRaWAN is also included.


Sign in / Sign up

Export Citation Format

Share Document