Energy Harvesting Methods for Internet of Things

Author(s):  
Vasaki Ponnusamy ◽  
Yen Pei Tay ◽  
Lam Hong Lee ◽  
Tang Jung Low ◽  
Cheah Wai Zhao

Internet of Things (IoT) has becoming a central theme in current technology trend whereby objects, people or even animals and plants can exchange information over the Internet. IoT can be referred as a network of interconnected devices such as wearables, sensors and implantables, that has the ability to sense, interact and make collective decisions autonomously. In short, IoT enables a full spectrum of machine-to-machine communications equipped with distributed data collection capabilities and connected through the cloud to facilitate centralized data analysis. Despite its great potential, the reliability of IoT devices is impeded with limited energy supply if these devices were to deploy particularly in energy-scarced locations or where no human intervention is possible. The best possible deployment of IoT technology is directed to cater for unattended situations like structural or environmental health monitoring. This opens up a new research area in IoT energy efficiency domain. A possible alternative to address such energy constraint is to look into re-generating power of IoT devices or more precisely known as energy harvesting or energy scavenging. This chapter presents the review of various energy harvesting mechanisms, current application of energy harvesting in IoT domain and its future design challenges.

Author(s):  
Vasaki Ponnusamy ◽  
Yen Pei Tay ◽  
Lam Hong Lee ◽  
Tang Jung Low ◽  
Cheah Wai Zhao

Internet of Things (IoT) has becoming a central theme in current technology trend whereby objects, people or even animals and plants can exchange information over the Internet. IoT can be referred as a network of interconnected devices such as wearables, sensors and implantables, that has the ability to sense, interact and make collective decisions autonomously. In short, IoT enables a full spectrum of machine-to-machine communications equipped with distributed data collection capabilities and connected through the cloud to facilitate centralized data analysis. Despite its great potential, the reliability of IoT devices is impeded with limited energy supply if these devices were to deploy particularly in energy-scarced locations or where no human intervention is possible. The best possible deployment of IoT technology is directed to cater for unattended situations like structural or environmental health monitoring. This opens up a new research area in IoT energy efficiency domain. A possible alternative to address such energy constraint is to look into re-generating power of IoT devices or more precisely known as energy harvesting or energy scavenging. This chapter presents the review of various energy harvesting mechanisms, current application of energy harvesting in IoT domain and its future design challenges.


Sensors ◽  
2020 ◽  
Vol 20 (2) ◽  
pp. 407 ◽  
Author(s):  
Omar A. Saraereh ◽  
Amer Alsaraira ◽  
Imran Khan ◽  
Bong Jun Choi

The Internet-of-things (IoT) has been gradually paving the way for the pervasive connectivity of wireless networks. Due to the ability to connect a number of devices to the Internet, many applications of IoT networks have recently been proposed. Though these applications range from industrial automation to smart homes, healthcare applications are the most critical. Providing reliable connectivity among wearables and other monitoring devices is one of the major tasks of such healthcare networks. The main source of power for such low-powered IoT devices is the batteries, which have a limited lifetime and need to be replaced or recharged periodically. In order to improve their lifecycle, one of the most promising proposals is to harvest energy from the ambient resources in the environment. For this purpose, we designed an energy harvesting protocol that harvests energy from two ambient energy sources, namely radio frequency (RF) at 2.4 GHz and thermal energy. A rectenna is used to harvest RF energy, while the thermoelectric generator (TEG) is employed to harvest human thermal energy. To verify the proposed design, extensive simulations are performed in Green Castalia, which is a framework that is used with the Castalia simulator in OMNeT++. The results show significant improvements in terms of the harvested energy and lifecycle improvement of IoT devices.


Energies ◽  
2019 ◽  
Vol 12 (20) ◽  
pp. 3873 ◽  
Author(s):  
Syeda Adila Afghan ◽  
Husi Géza

This paper presents a simulation-based study for characterizing and analyzing the performance of a commercially available thermoelectric cooler (TEC) as a generator for harvesting heat energy along with a commercial-off-the-shelf (COTS) power management integrated circuit (PMIC); LTC3108. In this model, the transformation of heat was considered in terms of an electrical circuit simulation perspective, where temperature experienced by TEC on both cold and hot sides was incorporated with voltage supply as Vth and Vtc in the circuit. When it comes to modeling a system in a simulation program with an integrated circuit emphasis (SPICE) like environment, the selection of thermoelectric generator (TEG) and extraction methods are not straightforward as well as the lack of information from manufacturer’s datasheets can limit the grip over the analysis parameters of the module. Therefore, it is mandatory to create a prototype before implementing it over a physical system for energy harvesting circuit (EHC) optimization. The major goal was to establish the basis for devising the thermal energy scavenging based Internet of Things (IoT) system with two configurations of voltage settings for the same TEG model. This study measured the data in terms of current, voltage, series of resistive loads and various temperature gradients for generating the required power. These generated power levels from EHC prototype were able to sustain the available IoT component’s power requirement, hence it could be considered for the implementation of IoT based applications.


Author(s):  
Muhammad Rizwan Ghori ◽  
Tat-Chee Wan

Bluetooth Low Energy (BLE) Mesh Networks enable flexible and reliable communications for low-power Internet of Things (IoT) devices. Most BLE-based mesh protocols are implemented as overlays on top of the standard Bluetooth star topologies while using piconets and scatternets. Nonetheless, mesh topology support has increased the vulnerability of BLE to security threats, since a larger number of devices can participate in a BLE Mesh network. To address these concerns, BLE version 5 enhanced existing BLE security features to deal with various authenticity, integrity, and confidentiality issues. Despite of the BLE version 5 security enhancements, viable IDS solutions for BLE Mesh networks remain a nascent research area.


2009 ◽  
pp. 2268-2274
Author(s):  
Vassilios S. Verykios

The enormous expansion of data collection and storage facilities has created an unprecedented increase in the need for data analysis and processing power. Data mining has long been the catalyst for automated and sophisticated data analysis and interrogation. Recent advances in data mining and knowledge discovery have generated controversial impact in both scientific and technological arenas. On the one hand, data mining is capable of analyzing vast amounts of information within a minimum amount of time, an analysis that has exceeded the expectations of even the most imaginative scientists of the last decade. On the other hand, the excessive processing power of intelligent algorithms which is brought with this new research area puts at risk sensitive and confidential information that resides in large and distributed data stores.


2021 ◽  
Vol 11 (9) ◽  
pp. 4262
Author(s):  
Jinhyoung Park ◽  
Hanchul Cho ◽  
Yong-Seok Lee

Energy harvesting, especially for powering low-power internet-of-things (IoT) devices, is gaining attention in recent years. Triboelectric nanogenerators have been studied to improve the output by applying a structure that can concentrate electrons on the surface of the generator materials. For enhancing the triboelectrification output, we herein focused on the power output line. A method for increasing the amount of electrons on the power lead by potential difference and their acceleration was studied. A rod was shaken by external vibrations; the accumulated charges were discharged in a manner similar to that of a lightning rod. Micro plasma was generated when the rod made contact with the mating micro-cracked surface innumerable times. The micro-cracked surface was fabricated with a diamond tip moving horizontally to the surface. As the resistance of the micro plasma was close to zero, the amount of electron movement was instantaneously accelerated. This type of triboelectric generator can be fabricated in the form of an electric box. By using this triboelectric power amplifier, voltage can be amplified 2 to 3 times, and the current can be amplified 10 to 15 times; thus, enhanced energy harvesting efficiency is attained.


2020 ◽  
Vol 6 (1) ◽  
Author(s):  
Krzysztof Cabaj ◽  
Piotr Żórawski ◽  
Piotr Nowakowski ◽  
Maciej Purski ◽  
Wojciech Mazurczyk

Abstract Each day more and more Internet of Things (IoT) devices are being connected to the Internet. In general, their applications are diverse but from the security perspective, it is evident that they are increasingly targeted by cybercriminals and used for nefarious purposes. Network covert channels form a subgroup of the information-hiding research area where secrets are sent over communication networks embedded within the network traffic. Such techniques can be used, among others, by malware developers to enable confidential data exfiltration or stealth communications. Recently, distributed network covert channels have raised the attention of security professionals as they allow the cloaking of secret transmission by spreading the covert bits among many different types of data-hiding techniques. However, although there are many works dealing with IoT security, little effort so far has been devoted in determining how effective the covert channels threat can be in the IoT henvironments. That is why, in this article, we present an extensive analysis on how distributed network covert channels that utilize network traffic from IoT devices can be used to perform efficient secret communication. More importantly, we do not focus on developing novel data-hiding techniques but, instead, considering the nature of IoT traffic, we investigate how to combine existing covert channels so the resulting data transfer is less visible. Moreover, as another contribution of our work, we prepare and share with the community the network traffic dataset that can be used to develop effective countermeasures against such threats.


Internet of Things (IoT) is an emerging technology that makes network of physical objects which can identify, communicate and share information through Internet. The edge of IoT network are mostly simple sensors. The success of the IoT application depends on the quality of sensor data at the right time, this leads to the requirement of IoT devices be long term, self-sustaining and have the ability to harvest their required energy from deployed environment. Such devices incur additional security challenges because of prolonged life time and change in the life cycle of devices. A novel intrusion detection system is designed for energy harvesting 6LoWPAN based IoT network considering the energy scavenging characteristics of devices in addition to conventional IoT. The simulation results confirm that the proposed intrusion detection system is efficient and accurate in detecting the attacks.


Sensors ◽  
2019 ◽  
Vol 19 (8) ◽  
pp. 1940 ◽  
Author(s):  
Joshua Curry ◽  
Nick Harris

The Internet of Things (IoT) is a constantly-evolving area of research and touches almost every aspect of life in the modern world. As technology moves forward, it is becoming increasingly important for these IoT devices for environmental sensing to become self-powered to enable long-term operation. This paper provides an outlook on the current state-of-the-art in terms of energy harvesting for these low-power devices. An analytical approach is taken, first defining types of environments in which energy-harvesters operate, before exploring both well-known and novel energy harvesting techniques and their uses in modern-day sensing.


Cybersecurity ◽  
2022 ◽  
Vol 5 (1) ◽  
Author(s):  
Tanusan Rajmohan ◽  
Phu H. Nguyen ◽  
Nicolas Ferry

AbstractSecurity of the Internet of Things (IoT)-based Smart Systems involving sensors, actuators and distributed control loop is of paramount importance but very difficult to address. Security patterns consist of domain-independent time-proven security knowledge and expertise. How are they useful for developing secure IoT-based smart systems? Are there architectures that support IoT security? We aim to systematically review the research work published on patterns and architectures for IoT security (and privacy). Then, we want to provide an analysis on that research landscape to answer our research questions. We follow the well-known guidelines for conducting systematic literature reviews. From thousands of candidate papers initially found in our search process, we have systematically distinguished and analyzed thirty-six (36) papers that have been peer-reviewed and published around patterns and architectures for IoT security and privacy in the last decade (January 2010–December 2020). Our analysis shows that there is a rise in the number of publications tending to patterns and architectures for IoT security in the last three years. We have not seen any approach of applying systematically architectures and patterns together that can address security (and privacy) concerns not only at the architectural level, but also at the network or IoT devices level. We also explored how the research contributions in the primary studies handle the different issues from the OWASP Internet of Things (IoT) top ten vulnerabilities list. Finally, we discuss the current gaps in this research area and how to fill in the gaps for promoting the utilization of patterns for IoT security and privacy by design.


Sign in / Sign up

Export Citation Format

Share Document