scholarly journals Smart Networking of Company

Author(s):  
Bhakti J. Soochik

Abstract: This paper simulate IoT based smart companies and make our networking infrastructure effective, efficient and most importantly accurate with security. The simulator used is Cisco Packet Tracer, this tool has been used form many years in networking. Main strength of the tool is the offering of a variety of network components that simulate a real network, devices would then need to be interconnected and configured in order to create a network. Technology plays a critical role in all daily activities of the present day. One of these needs is to create a smart office that controls operation and turns off electronic devices via a smartphone. This implementation can be implemented effectively using package tracking software that includes IoT functions to control and simulate a smart office. The latest version of the tool Cisco introduced IoT functionalities, and now it is possible to add to the network smart devices, components, sensors, actuators and also devices that simulate microcontrollers such as Arudino or Raspberry Pi. All the IoT devices can be run on standard programs or can be customized by programming them with Java, Phyton or Blockly. This makes Cisco Packet Tracer an ideal tool for building IoT practical simulations. Smart-Industrial smart-company office offer simulation of a power plant that produces and stores electricity via solar panels and wind turbines. All the electricity is produced by smart devices, then stored and utilized to power a production chain filled with smart sensor and actuators. IoT security features are also introduced in the simulations. Keywords: Internet of things (IOT), Campus Network (CN), networking, wide area network (WAN).

2022 ◽  
Vol 11 (1) ◽  
pp. 5
Author(s):  
Njabulo Sakhile Mtetwa ◽  
Paul Tarwireyi ◽  
Cecilia Nombuso Sibeko ◽  
Adnan Abu-Mahfouz ◽  
Matthew Adigun

The Internet of Things (IoT) is changing the way consumers, businesses, and governments interact with the physical and cyber worlds. More often than not, IoT devices are designed for specific functional requirements or use cases without paying too much attention to security. Consequently, attackers usually compromise IoT devices with lax security to retrieve sensitive information such as encryption keys, user passwords, and sensitive URLs. Moreover, expanding IoT use cases and the exponential growth in connected smart devices significantly widen the attack surface. Despite efforts to deal with security problems, the security of IoT devices and the privacy of the data they collect and process are still areas of concern in research. Whenever vulnerabilities are discovered, device manufacturers are expected to release patches or new firmware to fix the vulnerabilities. There is a need to prioritize firmware attacks, because they enable the most high-impact threats that go beyond what is possible with traditional attacks. In IoT, delivering and deploying new firmware securely to affected devices remains a challenge. This study aims to develop a security model that employs Blockchain and the InterPlanentary File System (IPFS) to secure firmware transmission over a low data rate, constrained Long-Range Wide Area Network (LoRaWAN). The proposed security model ensures integrity, confidentiality, availability, and authentication and focuses on resource-constrained low-powered devices. To demonstrate the utility and applicability of the proposed model, a proof of concept was implemented and evaluated using low-powered devices. The experimental results show that the proposed model is feasible for constrained and low-powered LoRaWAN devices.


2021 ◽  
Vol 21 ◽  
pp. 84-96
Author(s):  
Sucheta Gupta ◽  
Sushil Lekhi

The technology has been growing from day to day in human life. The basic need of human to lead his/her life comfortably is a home. A home with updated latest technology which means a smart home. In such a scenario, there is a need to have an endeavour to have everything at the push of a button away, and more importantly, automated. Home Automation is such an endeavour, in which, all the electrical appliances present at home are connected to each other, having interactions with sensors placed at strategic positions in a closed loop manner to perform meagre tasks automatically, leaving less burden on the humans. With this project we are promoting the fact that Home Automation can greatly contribute to energy conservation too. This paper gives the basic idea use cisco packet tracer to implement smart home. Cisco implemented (IoT) functionalities in the latest version of the platform, and now it is possible to add all the smart devices, sensors, actuators, and devices, which simulate microcontrollers like Arduino or Raspberry Pi to the network. All IoT devices can be run on generic programs or modified by Java, Python or Blocky programming them. This makes Cisco Packet Tracer a perfect method to construct functional simulations for IoT.


Author(s):  
Domenico Garlisi ◽  
Alessio Martino ◽  
Jad Zouwayhed ◽  
Reza Pourrahim ◽  
Francesca Cuomo

AbstractThe interest in the Internet of Things (IoT) is increasing both as for research and market perspectives. Worldwide, we are witnessing the deployment of several IoT networks for different applications, spanning from home automation to smart cities. The majority of these IoT deployments were quickly set up with the aim of providing connectivity without deeply engineering the infrastructure to optimize the network efficiency and scalability. The interest is now moving towards the analysis of the behavior of such systems in order to characterize and improve their functionality. In these IoT systems, many data related to device and human interactions are stored in databases, as well as IoT information related to the network level (wireless or wired) is gathered by the network operators. In this paper, we provide a systematic approach to process network data gathered from a wide area IoT wireless platform based on LoRaWAN (Long Range Wide Area Network). Our study can be used for profiling IoT devices, in order to group them according to their characteristics, as well as detecting network anomalies. Specifically, we use the k-means algorithm to group LoRaWAN packets according to their radio and network behavior. We tested our approach on a real LoRaWAN network where the entire captured traffic is stored in a proprietary database. Quite important is the fact that LoRaWAN captures, via the wireless interface, packets of multiple operators. Indeed our analysis was performed on 997, 183 packets with 2169 devices involved and only a subset of them were known by the considered operator, meaning that an operator cannot control the whole behavior of the system but on the contrary has to observe it. We were able to analyze clusters’ contents, revealing results both in line with the current network behavior and alerts on malfunctioning devices, remarking the reliability of the proposed approach.


Author(s):  
Olof Magnusson ◽  
Rikard Teodorsson ◽  
Joakim Wennerberg ◽  
Stig Arne Knoph

LoRaWAN (long-range wide-area network) is an emerging technology for the connection of internet of things (IoT) devices to the internet and can as such be an important part of decision support systems. In this technology, IoT devices are connected to the internet through gateways by using long-range radio signals. However, because LoRaWAN is an open network, anyone has the ability to connect an end device or set up a gateway. Thus, it is important that gateways are designed in such a way that their ability to be used maliciously is limited. This chapter covers relevant attacks against gateways and potential countermeasures against them. A number of different attacks were found in literature, including radio jamming, eavesdropping, replay attacks, and attacks against the implementation of what is called beacons in LoRaWAN. Countermeasures against these attacks are discussed, and a suggestion to improve the security of LoRaWAN is also included.


Author(s):  
Siska Indrayani ◽  
Edidas Edidas ◽  
Thamrin Thamrin

Problems in this research The media used in the teaching and learning process still has a shortage of the limited physical component in SMK Negeri 1 Lembah Melintang. This study aims to determine the effect of the use of GNS3 on the results of learning network-based broad-based installation of students of class XI TKJ SMK Negeri 1 Lembah Melintang. This type of research is experimental research. class  experimentI is class TKJ A using software simulation GNS3 and class experiment II is TKJ B using sotware simulation packet tracer. Technique of collecting data from post-test value, then analyzed for homogeneity test, normality test and hypothesis test. From the experimental class experimental I result I get the average value 78.77 and experiment II get average value 75,42. The result of hypothesis calculation at significant level α = 0,05 got tcount> ttable (3,574> 1,688), because big tcount of ttable, null hypothesis (H0) rejected and alternative hypothesis (Ha) accepted. Thus, the hypothesis is accepted that there is a significant comparation to the student learning outcomes using Software GNS3 to the learning outcomes of installation of broad-based network devices on students of class XI TKJ SMK Negeri 1 Lembah Melintang. Keywords: learning outcomes, GNS3, Packet Tracer.


Sensors ◽  
2019 ◽  
Vol 19 (7) ◽  
pp. 1492 ◽  
Author(s):  
Pantaleone Nespoli ◽  
David Useche Pelaez ◽  
Daniel Díaz López ◽  
Félix Gómez Mármol

The Internet of Things (IoT) became established during the last decade as an emerging technology with considerable potentialities and applicability. Its paradigm of everything connected together penetrated the real world, with smart devices located in several daily appliances. Such intelligent objects are able to communicate autonomously through already existing network infrastructures, thus generating a more concrete integration between real world and computer-based systems. On the downside, the great benefit carried by the IoT paradigm in our life brings simultaneously severe security issues, since the information exchanged among the objects frequently remains unprotected from malicious attackers. The paper at hand proposes COSMOS (Collaborative, Seamless and Adaptive Sentinel for the Internet of Things), a novel sentinel to protect smart environments from cyber threats. Our sentinel shields the IoT devices using multiple defensive rings, resulting in a more accurate and robust protection. Additionally, we discuss the current deployment of the sentinel on a commodity device (i.e., Raspberry Pi). Exhaustive experiments are conducted on the sentinel, demonstrating that it performs meticulously even in heavily stressing conditions. Each defensive layer is tested, reaching a remarkable performance, thus proving the applicability of COSMOS in a distributed and dynamic scenario such as IoT. With the aim of easing the enjoyment of the proposed sentinel, we further developed a friendly and ease-to-use COSMOS App, so that end-users can manage sentinel(s) directly using their own devices (e.g., smartphone).


Sensors ◽  
2019 ◽  
Vol 19 (21) ◽  
pp. 4651 ◽  
Author(s):  
Shadia Awadallah ◽  
David Moure ◽  
Pedro Torres-González

In the last few years, there has been a huge interest in the Internet of Things (hereinafter IoT) field. Among the large number of IoT technologies, the low-power wide-area network (hereinafter LPWAN) has emerged providing low power, low data-rate communication over long distances, enabling battery-operated devices to operate for long time periods. This paper introduces an application of long-range (hereinafter LoRa) technology, one of the most popular LPWANs, to volcanic surveillance. The first low-power and low-cost wireless network based on LoRa to monitor the soil temperature in thermal anomaly zones in volcanic areas has been developed. A total of eight thermometers (end devices) have been deployed on a Teide volcano in Tenerife (Canary Islands). In addition, a repeater device was developed to extend the network range when the gateway did not have a line of sight connection with the thermometers. Combining LoRa communication capabilities with microchip microcontrollers (end devices and repeater) and a Raspberry Pi board (gateway), three main milestones have been achieved: (i) extreme low-power consumption, (ii) real-time and proper temperature acquisition, and (iii) a reliable network operation. The first results are shown. These results provide enough quality for a proper volcanic surveillance.


Sensors ◽  
2019 ◽  
Vol 19 (1) ◽  
pp. 209 ◽  
Author(s):  
Steven J. Johnston ◽  
Philip J. Basford ◽  
Florentin M. J. Bulot ◽  
Mihaela Apetroaie-Cristea ◽  
Natasha H. C. Easton ◽  
...  

Air Quality (AQ) is a very topical issue for many cities and has a direct impact on citizen health. The AQ of a large UK city is being investigated using low-cost Particulate Matter (PM) sensors, and the results obtained by these sensors have been compared with government operated AQ stations. In the first pilot deployment, six AQ Internet of Things (IoT) devices have been designed and built, each with four different low-cost PM sensors, and they have been deployed at two locations within the city. These devices are equipped with LoRaWAN wireless network transceivers to test city scale Low-Power Wide Area Network (LPWAN) coverage. The study concludes that (i) the physical device developed can operate at a city scale; (ii) some low-cost PM sensors are viable for monitoring AQ and for detecting PM trends; (iii) LoRaWAN is suitable for city scale sensor coverage where connectivity is an issue. Based on the findings from this first pilot project, a larger LoRaWAN enabled AQ sensor network is being deployed across the city of Southampton in the UK.


Sign in / Sign up

Export Citation Format

Share Document