A 120 Mbps WDM-based VLC system for implementation of Internet of Things

2021 ◽  
Vol 0 (0) ◽  
Author(s):  
Vasudevan Boobhalon ◽  
Kishore Vijayam ◽  
Karasala Vendata Sai Charan

Abstract It is envisioned that by 2022, the number of Internet of Things (IoT) devices will be more than 20 billion. The transfer of information between IoT devices is heavily dependent on wireless links based on the radio frequency (RF) spectrum. Due to the scarcity of limited and licensed RF spectrum, visible light communication (VLC) based IoT links can be considered as a promising and viable solution. In this work, four channels are multiplexed to carry low-datarate information over a VLC link using cost-effective and easy to implement on-off-keying (OOK). Red, blue, green, and amber light-emitting diodes (LEDs) are deployed for parallel data transportation. The proposed system has been designed and simulated using Optisystem software. Through numerical simulations, we investigate the bit error rate (BER) performance of the proposed VLC link with increasing transmission range. Also, we investigate the BER performance of the proposed VLC link under the impact of increasing detection surface area, responsivity of the photodiode, and slope efficiency of the LEDs. Further, the performance of the proposed VLC link has been compared for different data transmission rates using non-return-to-zero and return-to-zero modulation schemes.

Sensors ◽  
2021 ◽  
Vol 21 (12) ◽  
pp. 4034
Author(s):  
Arie Haenel ◽  
Yoram Haddad ◽  
Maryline Laurent ◽  
Zonghua Zhang

The Internet of Things world is in need of practical solutions for its security. Existing security mechanisms for IoT are mostly not implemented due to complexity, budget, and energy-saving issues. This is especially true for IoT devices that are battery powered, and they should be cost effective to be deployed extensively in the field. In this work, we propose a new cross-layer approach combining existing authentication protocols and existing Physical Layer Radio Frequency Fingerprinting technologies to provide hybrid authentication mechanisms that are practically proved efficient in the field. Even though several Radio Frequency Fingerprinting methods have been proposed so far, as a support for multi-factor authentication or even on their own, practical solutions are still a challenge. The accuracy results achieved with even the best systems using expensive equipment are still not sufficient on real-life systems. Our approach proposes a hybrid protocol that can save energy and computation time on the IoT devices side, proportionally to the accuracy of the Radio Frequency Fingerprinting used, which has a measurable benefit while keeping an acceptable security level. We implemented a full system operating in real time and achieved an accuracy of 99.8% for the additional cost of energy, leading to a decrease of only ~20% in battery life.


2021 ◽  
pp. 3884-3896
Author(s):  
Mohammed Hassan Majhool, Haider Th. Salim Alrikabi, Mansour S. Farhan

Internet of Things (IOT) devices and monitoring systems are essential for the accurate, reliable, and proper functioning of photovoltaic (PV) solar energy systems. The data acquisition and monitoring system ensure adequate operation and ascertain system malfunctions before they become significant problems. The IOT integrates ordinary items using modern technology in the physical scope. It is all feasible to utility voltage, current, temperature, and humidity sensors. The current research focuses on developing a cost-effective, accessible, and steadfast data monitoring system. A microcontroller-based data logger is stored in a cloud. The data can be downloaded directly from the website using the IoT technique because photovoltaic (PV) panels are built-in faraway locations and humans cannot reach them. The suggested system demonstrates the online utilization of solar PV power.


2021 ◽  
Vol 11 (4) ◽  
pp. 14-41
Author(s):  
Ishtiaq Ahammad ◽  
Ashikur Rahman Khan ◽  
Zayed Us Salehin

The internet of things (IoT) offers a range of benefits for its users, ranging from quicker and more precise perception of our ecosystem to more cost-effective monitoring of manufacturing applications, by taking internet access to the things. Due to the ubiquitous existence of the internet, there's been an increasing pace in the IoT. Such a growing pace has brought about the term of IoT ecosystem. This exponential growing IoT ecosystem will encounter several challenges in its path. Computing domains were used from very initial stage to assist the IoT ecosystem and mitigate those challenges. To understand the impact of computing domains in IoT ecosystem, this paper performs the elaborative study on cloud, fog, roof, and dew computing including their interaction, benefits, and limitations in IoT ecosystem. The brief comparative analysis on these four computing domains are then performed. The impact of internet and offline computing on these computing domains are then analyzed in depth. Finally, this paper presents the suggestions of potential appropriate computing domain strategies for IoT ecosystems.


Technologies ◽  
2019 ◽  
Vol 7 (3) ◽  
pp. 50 ◽  
Author(s):  
Luca De De Nardis ◽  
Giuseppe Caso ◽  
Maria Gabriella Di Benedetto

Seamless location awareness is considered a cornerstone in the successful deployment of the Internet of Things (IoT). Support for IoT devices in indoor positioning platforms and, vice versa, availability of indoor positioning functions in IoT platforms, are however still in their early stages, posing a significant challenge in the study and research of the interaction of indoor positioning and IoT. This paper proposes a new indoor positioning platform, called ThingsLocate, that fills this gap by building upon the popular and flexible ThingSpeak cloud service for IoT, leveraging its data input and data processing capabilities and, most importantly, its native support for cloud execution of Matlab code. ThingsLocate provides a flexible, user-friendly WiFi fingerprinting indoor positioning service for IoT devices, based on Received Signal Strength Indicator (RSSI) information. The key components of ThingsLocate are introduced and described: RSSI channels used by IoT devices to provide WiFi RSSI data, an Analysis app estimating the position of the device, and a Location channel to publish such estimate. A proof-of-concept implementation of ThingsLocate is then introduced, and used to show the possibilities offered by the platform in the context of graduate studies and academic research on indoor positioning for IoT. Results of an experiment enabled by ThingsLocate with limited setup and no coding effort are presented, focusing on the impact of using different devices and different positioning algorithms on positioning accuracy.


2021 ◽  
Vol 2 (4) ◽  
pp. 1-23
Author(s):  
Morshed Chowdhury ◽  
Biplob Ray ◽  
Sujan Chowdhury ◽  
Sutharshan Rajasegarar

Due to the widespread functional benefits, such as supporting internet connectivity, having high visibility and enabling easy connectivity between sensors, the Internet of Things (IoT) has become popular and used in many applications, such as for smart city, smart health, smart home, and smart vehicle realizations. These IoT-based systems contribute to both daily life and business, including sensitive and emergency situations. In general, the devices or sensors used in the IoT have very limited computational power, storage capacity, and communication capabilities, but they help to collect a large amount of data as well as maintain communication with the other devices in the network. Since most of the IoT devices have no physical security, and often are open to everyone via radio communication and via the internet, they are highly vulnerable to existing and emerging novel security attacks. Further, the IoT devices are usually integrated with the corporate networks; in this case, the impact of attacks will be much more significant than operating in isolation. Due to the constraints of the IoT devices, and the nature of their operation, existing security mechanisms are less effective for countering the attacks that are specific to the IoT-based systems. This article presents a new insider attack, named loophole attack , that exploits the vulnerabilities present in a widely used IPv6 routing protocol in IoT-based systems, called RPL (Routing over Low Power and Lossy Networks). To protect the IoT system from this insider attack, a machine learning based security mechanism is presented. The proposed attack has been implemented using a Contiki IoT operating system that runs on the Cooja simulator, and the impacts of the attack are analyzed. Evaluation on the collected network traffic data demonstrates that the machine learning based approaches, along with the proposed features, help to accurately detect the insider attack from the network traffic data.


Author(s):  
Bryan Lucas Gonçalves dos Santos ◽  
Lívia De Carvalho Campos Lins ◽  
Lincoln Machado de Araújo ◽  
Luís Romeu Nunes ◽  
Rossana Moreno Santa Cruz

<p class="Normal1">Este trabalho propõe um sistema de Comunicação por Luz Visível (<em>Visible Light Communication</em>, VLC),  de baixo custo e fácil implementação para aplicações, por exemplo, em Internet das Coisas <em>(Internet of Things</em>, IoT). São apresentados resultados de simulações, ressaltando os pontos fortes e fracos da arquitetura proposta. Os resultados obtidos são baseados no uso de Diodos Emissores de Luz (<em>Light Emitting Diodes</em>, LED) para a iluminação residencial e na modulação ASK (<em>Amplitude Shift Keying</em>). O sistema possui a capacidade de transmissão simplex de informações multimídia de maneira eficiente, de acordo com a técnica de modulação e o protocolo de comunicação empregados, utilizando um <em>clock</em> óptico de 4 MHz e alcançando uma taxa de transmissão efetiva de 3,2 Mbits/s.</p>


2015 ◽  
Vol 2015 ◽  
pp. 1-16 ◽  
Author(s):  
Floris Van den Abeele ◽  
Jeroen Hoebeke ◽  
Ingrid Moerman ◽  
Piet Demeester

As the Internet of Things continues to expand in the coming years, the need for services that span multiple IoT application domains will continue to increase in order to realize the efficiency gains promised by the IoT. Today, however, service developers looking to add value on top of existing IoT systems are faced with very heterogeneous devices and systems. These systems implement a wide variety of network connectivity options, protocols (proprietary or standards-based), and communication methods all of which are unknown to a service developer that is new to the IoT. Even within one IoT standard, a device typically has multiple options for communicating with others. In order to alleviate service developers from these concerns, this paper presents a cloud-based platform for integrating heterogeneous constrained IoT devices and communication models into services. Our evaluation shows that the impact of our approach on the operation of constrained devices is minimal while providing a tangible benefit in service integration of low-resource IoT devices. A proof of concept demonstrates the latter by means of a control and management dashboard for constrained devices that was implemented on top of the presented platform. The results of our work enable service developers to more easily implement and deploy services that span a wide variety of IoT application domains.


2019 ◽  
Vol 20 (2) ◽  
pp. 365-376 ◽  
Author(s):  
Vivek Kumar Prasad ◽  
Madhuri D Bhavsar ◽  
Sudeep Tanwar

The evolution of the Internet of Things (IoT) has augmented the necessity for Cloud, edge and fog platforms. The chief benefit of cloud-based schemes is they allow data to be collected from numerous services and sites, which is reachable from any place of the world. The organizations will be benefited by merging the cloud platform with the on-site fog networks and edge devices and as result, this will increase the utilization of the IoT devices and end users too. The network traffic will reduce as data will be distributed and this will also improve the operational efficiency. The impact of monitoring in edge and fog computing can play an important role to efficiently utilize the resources available at these layers. This paper discusses various techniques involved for monitoring for edge and fog computing and its advantages. The paper ends with a case study to demonstarte the need of monitoring in fog and edge in the healthcare system.


2018 ◽  
Vol 2018 ◽  
pp. 1-11 ◽  
Author(s):  
Dmitry Kozyrev ◽  
Aleksandr Ometov ◽  
Dmitri Moltchanov ◽  
Vladimir Rykov ◽  
Dmitry Efrosinin ◽  
...  

Today, the number of interconnected Internet of Things (IoT) devices is growing tremendously followed by an increase in the density of cellular base stations. This trend has an adverse effect on the power efficiency of communication, since each new infrastructure node requires a significant amount of energy. Numerous enablers are already in place to offload the scarce cellular spectrum, thus allowing utilization of more energy-efficient short-range radio technologies for user content dissemination, such as moving relay stations and network-assisted direct connectivity. In this work, we contribute a new mathematical framework aimed at analyzing the impact of network offloading on the probabilistic characteristics related to the quality of service and thus helping relieve the energy burden on infrastructure network deployments.


2018 ◽  
Vol 2018 ◽  
pp. 1-18 ◽  
Author(s):  
Daniel Díaz López ◽  
María Blanco Uribe ◽  
Claudia Santiago Cely ◽  
Andrés Vega Torres ◽  
Nicolás Moreno Guataquira ◽  
...  

Due to the growth of IoT (Internet of Things) devices in different industries and markets in recent years and considering the currently insufficient protection for these devices, a security solution safeguarding IoT architectures are highly desirable. An interesting perspective for the development of security solutions is the use of an event management approach, knowing that an event may become an incident when an information asset is affected under certain circumstances. The paper at hand proposes a security solution based on the management of security events within IoT scenarios in order to accurately identify suspicious activities. To this end, different vulnerabilities found in IoT devices are described, as well as unique features that make these devices an appealing target for attacks. Finally, three IoT attack scenarios are presented, describing exploited vulnerabilities, security events generated by the attack, and accurate responses that could be launched to help decreasing the impact of the attack on IoT devices. Our analysis demonstrates that the proposed approach is suitable for protecting the IoT ecosystem, giving an adequate protection level to the IoT devices.


Sign in / Sign up

Export Citation Format

Share Document