scholarly journals IEEE 802.11ah Network Planning for IoT Smart Meter Application: Case Study in Bandung Area

2020 ◽  
Vol 5 (1) ◽  
pp. 11
Author(s):  
Fachri Nugraha Adhiatma ◽  
Doan Perdana ◽  
Nachwan Mufti Adriansyah ◽  
Risqi Herlambang Raharjo

The growth of Wireless Fidelity (WiFi) technology is so rapid and popular. The technology most widely used for WiFi services is the IEEE 802.11 family of standards. To support the Internet of Things (IoT) era, 802.11ah standard technology has developed, and the standard is intended to provide a low-cost mode of operation, with a wider coverage area, and can support thousands of devices per cell. This paper discusses IEEE 802.11ah Standard Network Planning for the Internet of Things Application (Case Study: Smart Meter Using WiFi.id Network in Bandung), to improve network quality in terms of coverage and capacity to improve the efficiency of the WiFi network and so that it can supports the Internet of Things (IoT) service. Network planning using 802.11ah for the internet of things application with a smart meter case study using the WiFi.id network has been successfully carried out. To cover the entire area of Bandung, 23 sites are required. In the capacity, the Tx slots needed to cover possible smart meters for each site are only 9 tx slots out of a total of 100 tx slots. 

Computer ◽  
2016 ◽  
Vol 49 (5) ◽  
pp. 87-90 ◽  
Author(s):  
Phillip A. Laplante ◽  
Jeffrey Voas ◽  
Nancy Laplante

2018 ◽  
Vol 5 (2) ◽  
pp. 1275-1284 ◽  
Author(s):  
Gopika Premsankar ◽  
Mario Di Francesco ◽  
Tarik Taleb

Sensors ◽  
2019 ◽  
Vol 19 (19) ◽  
pp. 4121 ◽  
Author(s):  
Alberto Giaretta ◽  
Nicola Dragoni ◽  
Fabio Massacci

Cybersecurity is one of the biggest challenges in the Internet of Things (IoT) domain, as well as one of its most embarrassing failures. As a matter of fact, nowadays IoT devices still exhibit various shortcomings. For example, they lack secure default configurations and sufficient security configurability. They also lack rich behavioural descriptions, failing to list provided and required services. To answer this problem, we envision a future where IoT devices carry behavioural contracts and Fog nodes store network policies. One requirement is that contract consistency must be easy to prove. Moreover, contracts must be easy to verify against network policies. In this paper, we propose to combine the security-by-contract (S × C) paradigm with Fog computing to secure IoT devices. Following our previous work, first we formally define the pillars of our proposal. Then, by means of a running case study, we show that we can model communication flows and prevent information leaks. Last, we show that our contribution enables a holistic approach to IoT security, and that it can also prevent unexpected chains of events.


Sensors ◽  
2015 ◽  
Vol 15 (1) ◽  
pp. 2137-2160 ◽  
Author(s):  
Minwoo Ryu ◽  
Jaeho Kim ◽  
Jaeseok Yun

2013 ◽  
Vol 336-338 ◽  
pp. 2512-2515
Author(s):  
Li Min Liu

The internet of things is a foundation for connecting things, sensors, actuators, and other smart technologies, thus enabling person-to-object and object-to-object communications. Its applications are concerned to emergency response, intelligent shopping, smart product management, smart meters, home automation, waste management, sustainable urban environment, continuous care and so on. As automatic identification sensor, RFID is a foundational component for the internet of things. In this paper, internet of things, RFID and technical analysis for IoT and RFID are discussed.


Sign in / Sign up

Export Citation Format

Share Document