An Architecture and Reference Implementation for WSN-Based IoT Systems

2022 ◽  
pp. 80-103
Author(s):  
Burak Karaduman ◽  
Bentley James Oakes ◽  
Raheleh Eslampanah ◽  
Joachim Denil ◽  
Hans Vangheluwe ◽  
...  

The Internet of Things and its technologies have evolved quickly in recent years. It became an umbrella term for various technologies, embedded devices, smart objects, and web services. Although it has gained maturity, there is still no clear or common definition of references for creating WSN-based IoT systems. In the awareness that creating an omniscient and ideal architecture that can suit all design requirements is not feasible, modular and scalable architecture that supports adding or subtracting components to fit a lot of requirements of various use cases should be provided as a starting point. This chapter discusses such an architecture and reference implementation. The architecture should cover multiple layers, including the cloud, the gateway, and the edges of the target system, which allows monitoring the environment, managing the data, programming the edge nodes and networking model to establish communication between horizontal and vertical embedded devices. In order to exemplify the proposed architecture and reference implementation, a smart irrigation case study is used.

Computer ◽  
2016 ◽  
Vol 49 (5) ◽  
pp. 87-90 ◽  
Author(s):  
Phillip A. Laplante ◽  
Jeffrey Voas ◽  
Nancy Laplante

Crimen ◽  
2020 ◽  
Vol 11 (3) ◽  
pp. 255-271
Author(s):  
Sanja Milivojević ◽  
Elizabeth Radulski

The Internet of Things (IoT) is poised to revolutionise the way we live and communicate, and the manner in which we engage with our social and natural world. In the IoT, objects such as household items, vending machines and cars have the ability to sense and share data with other things, via wireless, Bluetooth, or Radio Frequency IDentification (RFID) technology. "Smart things" have the capability to control their performance, as well as our experiences and decisions. In this exploratory paper, we overview recent developments in the IoT technology, and their relevance for criminology. Our aim is to partially fill the gap in the literature, by flagging emerging issues criminologists and social scientists ought to engage with in the future. The focus is exclusively on the IoT while other advances, such as facial recognition technology, are only lightly touched upon. This paper, thus, serves as a starting point in the conversation, as we invite scholars to join us in forecasting-if not preventing-the unwanted consequences of the "future Internet".


2018 ◽  
Vol 5 (2) ◽  
pp. 1275-1284 ◽  
Author(s):  
Gopika Premsankar ◽  
Mario Di Francesco ◽  
Tarik Taleb

Author(s):  
Shannon Roper ◽  
Sharmila Pixy Ferris

Many researchers have observed that the Internet has changed the concept of virtual communities (Barnes, 2001, 2003; Jones, 1995, 1998; Rheingold, 1993). A unique example of virtual communities is a MOO—a specialized interactive online community that is usually based on a work of fiction such as book series, theater or television (Bartle, 1990). MOOs share many of the features of multi-user dimensions (MUDs) in that both allow participants to create their own virtual worlds, but some researchers consider MOOs to be “more sophisticated” (Barnes, 2001, p. 94). In a MOO community, the participants or “players” create their own virtual communities—fantasy communities complete with world structures, interpersonal norms and social constructs. Individual participants create characters complete with environment, history and personality constructs. The characters interact and influence each other and their environments, just as do the members of real-world communities. The MOO discussed in this case study is based on acclaimed fantasy author Anne McCaffery’s book series set on the fictional world of “Pern.” The players on DragonWings1 MOO create and develop characters over long periods, often many years, leading to the establishment and creation of a strong MOO. In this article we provide a case study of the DragonWings MOO as a unique virtual community. Because the concept of virtual communities is evolving with the Internet, and no definitive understanding of virtual community or virtual culture yet exists, we have chosen to structure our analysis of DragonWings MOO around the classical anthropological definition of culture and community. A seminal definition of culture, first articulated by Tylor (1871), provides the springboard for a number of anthropological definitions widely used today. Building on Tylor, White (1959), a prominent cultural scholar, defined culture as “within human organisms, i.e., concepts, beliefs, emotions, attitudes; within processes of social interaction among human beings; and within natural objects” (p. 237). He also identified symbols as a primary defining characteristic of culture. White’s simple yet comprehensive definition yields clear criteria that lend themselves to our analysis of MOOs. At the broadest level, an application of the criteria provides support for the acceptance of the Internet as a distinct and unique culture. At a more particular level, they provide a convenient tool for the analysis of a MOO as a virtual community. In the remainder of this article, we will utilize the definition outlined above to demonstrate the features that make DragonWings MOO a unique example of a virtual community.


Sensors ◽  
2020 ◽  
Vol 20 (5) ◽  
pp. 1400 ◽  
Author(s):  
Javier Silvestre-Blanes ◽  
Víctor Sempere-Payá ◽  
Teresa Albero-Albero

Today, a wide range of developments and paradigms require the use of embedded systems characterized by restrictions on their computing capacity, consumption, cost, and network connection. The evolution of the Internet of Things (IoT) towards Industrial IoT (IIoT) or the Internet of Multimedia Things (IoMT), its impact within the 4.0 industry, the evolution of cloud computing towards edge or fog computing, also called near-sensor computing, or the increase in the use of embedded vision, are current examples of this trend. One of the most common methods of reducing energy consumption is the use of processor frequency scaling, based on a particular policy. The algorithms to define this policy are intended to obtain good responses to the workloads that occur in smarthphones. There has been no study that allows a correct definition of these algorithms for workloads such as those expected in the above scenarios. This paper presents a method to determine the operating parameters of the dynamic governor algorithm called Interactive, which offers significant improvements in power consumption, without reducing the performance of the application. These improvements depend on the load that the system has to support, so the results are evaluated against three different loads, from higher to lower, showing improvements ranging from 62% to 26%.


Sensors ◽  
2019 ◽  
Vol 19 (19) ◽  
pp. 4121 ◽  
Author(s):  
Alberto Giaretta ◽  
Nicola Dragoni ◽  
Fabio Massacci

Cybersecurity is one of the biggest challenges in the Internet of Things (IoT) domain, as well as one of its most embarrassing failures. As a matter of fact, nowadays IoT devices still exhibit various shortcomings. For example, they lack secure default configurations and sufficient security configurability. They also lack rich behavioural descriptions, failing to list provided and required services. To answer this problem, we envision a future where IoT devices carry behavioural contracts and Fog nodes store network policies. One requirement is that contract consistency must be easy to prove. Moreover, contracts must be easy to verify against network policies. In this paper, we propose to combine the security-by-contract (S × C) paradigm with Fog computing to secure IoT devices. Following our previous work, first we formally define the pillars of our proposal. Then, by means of a running case study, we show that we can model communication flows and prevent information leaks. Last, we show that our contribution enables a holistic approach to IoT security, and that it can also prevent unexpected chains of events.


Sensors ◽  
2015 ◽  
Vol 15 (1) ◽  
pp. 2137-2160 ◽  
Author(s):  
Minwoo Ryu ◽  
Jaeho Kim ◽  
Jaeseok Yun

Sign in / Sign up

Export Citation Format

Share Document