scholarly journals What Is the Fastest Way to Connect Stations to a Wi-Fi HaLow Network?

Sensors ◽  
2018 ◽  
Vol 18 (9) ◽  
pp. 2744 ◽  
Author(s):  
Dmitry Bankov ◽  
Evgeny Khorov ◽  
Andrey Lyakhov ◽  
Ekaterina Stepanova ◽  
Le Tian ◽  
...  

Wi-Fi HaLow is an adaptation of the widespread Wi-Fi technology for the Internet of Things scenarios. Such scenarios often involve numerous wireless stations connected to a shared channel, and contention for the channel significantly affects the performance in such networks. Wi-Fi HaLow contains numerous solutions aimed at handling the contention between stations, two of which, namely, the Centralized Authentication Control (CAC) and the Distributed Authentication Control (DAC), address the contention reduction during the link set-up process. The link set-up process is special because the access point knows nothing of the connecting stations and its means of control of these stations are very limited. While DAC is self-adaptive, CAC does require an algorithm to dynamically control its parameters. Being just a framework, the Wi-Fi HaLow standard neither specifies such an algorithm nor recommends which protocol, CAC or DAC, is more suitable in a given situation. In this paper, we solve both issues by developing a novel robust close-to-optimal algorithm for CAC and compare CAC and DAC in a vast set of experiments.

Sensors ◽  
2020 ◽  
Vol 20 (5) ◽  
pp. 1409
Author(s):  
Angus Wong ◽  
Yan Tai Chow

As satellite communications provide ubiquitous coverage, they play a key role in providing Internet connectivity in remote or marginalized areas, so as to enable the vision of a truly global connectivity of the Internet of Things (IoT). However, these areas often lack reliable electricity supply. Thus, this paper proposes a satellite internet access point powered by solar energy, so that a stable Internet connection can be provided. The access point provides Wi-Fi coverage so that sensors, IoT, and devices can connect to the access point using the Wi-Fi, a common wireless technology. Our design took some cost-saving measures to make it affordable and selected the components that require minimal maintenance operations. The satellite access point costs about USD $500, and can provide four days of Internet connectivity without solar energy.


The internet of things is turning into an appealing framework worldview to acknowledge inter-connections throughout corporeal, digital as well as communal gaps. Through the connections amid the IoT, safety concerns befall important, along with it is huge to set up improved resolutions for safety protections. The IoT apparition of unlock data sharing is expert through using cloud registering concepts. Since IoT is depends on the web, safety concerns of internet will similarly emerge in IoT as well as IoT enclose three layers for example perception, transportation and application layers. The safety concerns, modernism along with solution recognized by the application layer are conversed about in this Paper. The principle focal point of this examination work is on Data Security Protection procedure for application layer


2019 ◽  
Author(s):  
Arthur Brito Cosmi ◽  
Vinicius F. S. Mota

With the growth of devices connected to the Internet, several application layer protocols specific for the Internet of Things (IoT) appear every day. This high number of protocols bring doubts to developers about what to use in their projects. This work aims to assist developers in the decision making in their IoT projects. This work presents a qualitative analysis of the MQTT, MQTT-SN, CoAP and AMQP protocols. In a qualitative way, we analyzed thedomains of application and requirements of the applications to map the protocol choice. After that, the MQTT and CoAP protocols were analyzed using devices with low processing and memory capabilities. Results show that MQTT outperforms CoAP when there are several other devices accessing the same access point.


Author(s):  
Vaios Koumaras ◽  
Marianna Kapari ◽  
Angeliki Papaioannou ◽  
George Theodoropoulos ◽  
Ioannis Stergiou ◽  
...  

The ubiquity of the internet led to a diverse number of devices referred to as the “things” to have online access. The internet of things (IoT) framework's infrastructure is formed by sensors, actuators, computer servers, and the communication network. Within this framework, the chapter focuses on IoT interoperability challenges through virtualization agility. The use of SDN/NFVs aims to face the 5G interoperability challenge by allowing the automatic deployment and programming of network services. Consequently, virtual gateways need to be used so that interoperability is ensured between various objects and technologies. As a result, experiments will be performed on various IoT platforms which consist of physical and virtual parts. In specific, the process will be on top of a testbed so that MQTT, CoAP, and UDP protocols will be instantiated and set up in order to provide an interoperable layer using a virtual gateway.


IEEE Access ◽  
2020 ◽  
Vol 8 ◽  
pp. 187384-187399
Author(s):  
Christian Krupitzer ◽  
Timur Temizer ◽  
Thomas Prantl ◽  
Claudia Raibulet

Author(s):  
Omar Yahya ◽  
Haider Th.Salim Alrikabi ◽  
Roa'a M. Al_airaji ◽  
Miad Faezipour

<p>In recent years, the Internet of things has become an urgent need in all of things that a person needs with least  effort and time. It covers in several areas, including controlling traffic and parking, following up on general and private buildings that  what you need of  periodic maintenance, and reducing energy through using  lighting Smart. In this paper, we focus on important thing and widespread in Iraq  , collection of solid waste in the streets without treatment, which causes environmental and psychological damage to the citizen.in addition , the solid waste deposal need set up sensors(RFID,GPS, ultrasonic, GSM,…etc), connecting them to Arduino Uno to accomplish specific intelligent processing that we need. Moreover, the system provides waste containers and warns the concerned departments in the city of the need to empty them when they reach a certain level, which makes the streets healthier, more attractive and free from rodents.</p>


2021 ◽  
Vol 3 (11) ◽  
pp. 31-42
Author(s):  
Ivan Opirskyy ◽  
Roman Holovchak ◽  
Iryna Moisiichuk ◽  
Tetyana Balianda ◽  
Sofiia Haraniuk

The Internet of Things or IoT is billions of physical devices connected to the Internet. Its main premise is simply an extended type of connection, which can then be used as a basis for all kinds of functions. IoT describes a network of physical objects - "things" that are built into sensors, software and other technologies to connect and communicate with other devices and systems over the Internet. Problems of system protection, including the use of IoT devices are studied by many scientists and specialists in this field, but in today's world, not every manufacturer is ready to declare vulnerabilities and general insecurity of their products (devices). Throughout the IoT environment, from manufacturers to users, there are still many IoT security issues, such as manufacturing standards, update management, physical hardening, user knowledge and awareness. This article examines the vulnerabilities of the Internet of Things. The analysis of information transfer technologies of IoT devices (in particular ZigBee, Signfox and Bluetooth) is carried out. The most common threats that a user may encounter have been identified and analyzed. It is also established that usually not only the manufacturer poses a threat to the security of IoT devices. There are also a number of tips for users who want to reduce the risk of data leakage associated with vulnerabilities in the Internet of Things. Unfortunately, it is not uncommon for such devices to be incorrectly set up, used and stored. Extremely common is the user's refusal to update the software, which in turn leaves open those vulnerabilities that the manufacturer is trying to fix. The main purpose of the article is to determine the causes of security threats to the Internet of Things, by analyzing data transmission technologies, analysis of the threats themselves, identifying the most critical of them and ways to reduce the risk of data theft


Sign in / Sign up

Export Citation Format

Share Document