A Reusable Device Driver Framework for the Sensor Nodes in Internet of Things

2012 ◽  
Vol 468-471 ◽  
pp. 60-63
Author(s):  
Xiao Fan Wu ◽  
Jia Jun Bu ◽  
Chun Chen

Due to the rapid development of Internet of Things (IoT), kinds of sensor nodes have been introduced to the different applications. Because of the variety of MCUs, sensors and radio modules, it’s challenging to reuse the device drivers between different sensor node platforms. To address this issue, a reusable device driver framework is proposed in this paper. Comparing with existed work, our framework is flexible, efficient, and easy to learn. The flexibility is achieved by layered encapsulation, which decouples the device driver with the sensor node operating system kernel. Our framework gives the reusability at the source code level, so it’s efficient. At the end, our framework is implemented in C programming language, which is the most common tool adopted by embedded system developing. This framework has applied to SenSpire OS, a micro-kernel real-time operating system for IoT sensor nodes.

2012 ◽  
Vol 452-453 ◽  
pp. 932-936
Author(s):  
Xiang Dong Hu ◽  
Peng Qin Yu

With the rapid development of ubiquitous network and its applications, the key technologies of the Internet of things are actively researched all over the world. The Internet of things has tremendous attraction for adversaries, and it is easily attacked due to poor resource and non-perfect distribution of sensor nodes, then false data maybe be injected into network. Security is one of the most important demands for applications in the Internet of things, an algorithm of malicious nodes detection is proposed to protect the network from destruction based on weighted confidence filter, namely, the cluster heads take charge of collecting messages from nodes and computing their average of confidence in cluster-based network, then they aggregate data from nodes with higher confidence than average and ignore the others, they update confidence of each node by comparing the aggregation value and the received data, and regard it as the weight of exactness of message from node. A sensor node is judged to be a malicious one if its weight is lower than the set threshold. The simulation results show that the algorithm can detect malicious nodes with high detection ratio, low false alarm ratio and outstanding scalability.


ACTA IMEKO ◽  
2021 ◽  
Vol 10 (2) ◽  
pp. 37
Author(s):  
Lorenzo Ciani ◽  
Marcantonio Catelani ◽  
Alessandro Bartolini ◽  
Giulia Guidi ◽  
Gabriele Patrizi

<p class="Abstract"><span lang="EN-US">The introduction of Big Data and Internet of Things has allowed the rapid development of smart farming technologies. Usually, systems implemented in smart farms monitor environmental conditions and soil parameter to improve productivity, to optimize soil conservation, to save water and to limit plant diseases. Wireless sensor networks are a widespread solution because they allow to implement effective and efficient crop monitoring. At the same time, wireless sensor networks can cover large area, they can ensure fault tolerance and they can acquire large amount of data. Recent literature misses to consider the testing of the hardware performances of such systems according to the actual operating conditions. The effects of a harsh environment on the dynamic metrological performances of sensor nodes are not sufficiently investigated. Consequently, this work deals with the electrical design optimization of a sensor node by means of thermal test used to reproduce the actual operating conditions of the nodes. The results of the node characterization through thermal tests are used to improve the node’s design and consequently to achieve higher performances in harsh operative conditions.</span></p>


2020 ◽  
Vol 63 (2) ◽  
pp. 325-337
Author(s):  
Lei Zhou ◽  
Zhengjun Qiu ◽  
Yong He

HighlightsA quick solution for developing and deploying custom agricultural IoT systems is proposed.Low-cost and high-performance devices are used for the design of sensor nodes.A mobile application based on WeChat Mini-Program is developed for device and data management.The proposed system brings convenience to both users and developers.Abstract. Increasing demand for automatic management of agricultural production and real-time remote monitoring has increased the need for smart devices, wireless technologies, and sensors. The internet of things (IoT) has emerged as a common technology for the management of multiple devices by multiple users. Some professional solutions are relatively difficult to implement for researchers who are interested in agricultural IoT but do not have requisite skills in computers and electronics. The unfriendliness of the user software limits the practical application of agricultural IoT in China. This article presents a simple solution based on an SoC (system-on-chip) and WeChat mini-program that focuses on low-cost hardware, rapid development, user-friendly application design, and helping developers get a quick start in building a DIY monitoring system. The ESP8266, a high-performance SoC, is used as the microcontroller and Wi-Fi module to transfer the sensor data to a remote server. A WeChat mini-program provides the graphical user interface, enabling users to manage devices and access data by clicking. Users can log into the system using their WeChat accounts and bind devices by scanning QR codes on the devices. Thus, the complex management and device binding in conventional systems can be overcome. The system is easy to be expand and has great potential for greenhouse environmental monitoring in China. Keywords: Greenhouse ambient monitoring, Internet of things, WeChat mini-program, Wi-Fi SoC.


2002 ◽  
Vol 4 (4) ◽  
pp. 219-234 ◽  
Author(s):  
Hamish Harvey ◽  
Dawei Han

Open Source, in which the source code to software is freely shared and improved upon, has recently risen to prominence as an alternative to the more usual closed approach to software development. A number of high profile projects, such as the Linux operating system kernel and the Apache web server, have demonstrated that Open Source can be technically effective, and companies such as Cygnus Solutions (now owned by Red Hat) and Zope Corporation have demonstrated that it is possible to build successful companies around open source software. Open Source could have significant benefits for hydroinformatics, encouraging widespread interoperability and rapid development. In this paper we present a brief history of Open Source, a summary of some reasons for its effectiveness, and we explore how and why Open Source is of particular interest in the field of hydroinformatics. We argue that for technical, scientific and business reasons, Open Source has a lot to offer.


Author(s):  
Erfansyah Ali ◽  
Andriyan B Suksmono

One of methods in remote sensing is Synthetic Aperture Radar (SAR). When combined with Range DopplerAlgorithm (RDA) can produce smaller radar resolution only by using normal sized antenna placed atplatform. RDA is able to generate much wider aperture �synthetic� antenna, resulting very narrow beamwidthwhen reach earth's ground. By using already established 2D SAR methods in accuracy andprocessing speed this 3D SAR simulation was developed. Simulated on 15 x 15 pixels grayscale targets atdifferent heights, 3D SAR developed on this research can detect object's height accurately. Thissimulation was developed using JAVA as steppingstone in implementing SAR image processing in smallsystem like embedded system or micro computing which normally using C programming language.


Author(s):  
E. Anbarasi ◽  
N. karthik

In embedded software, scheduler is one of the essential component. It is essential to schedule the task in a suitable way to achieve the system optimization. Time triggered scheduling approaches render a reliable performance for real time systems. This paper sketches on time triggered schedulers which tends to results in highly predictable system behavior. Despite many scheduling approaches, time triggered cooperative and time triggered hybrid schedulers have more attention in resource constrained embedded system which works on single processor. Our target of this work is to analyze these time triggered schedulers’ performances. We evaluated and studied the performance of those time triggered schedulers with various parameters. The results have been incurred by implementation of schedulers in embedded c programming language with simulation tool.


2016 ◽  
Vol 12 (05) ◽  
pp. 58
Author(s):  
X. Xu ◽  
B. Z. Liu

A wireless sensor network (WSN) is one of the core technologies of the Internet of things. It is an important means to realize a real-time geographic information system. Related research has shown that in the future, tens of billions of sensors and intelligent terminal equipment will be connected to WSNs based on the establishment of the function of the Internet of things. This study presents a heuristic algorithm to balance the energy consumption of each sensor node. It proposes a new real-time dynamic allocation algorithm for sensor tasks based on the concept of this heuristic algorithm and by considering that a multisensory system is composed of a phased-array radar. This allocation algorithm can dynamically assign tasks to the most suitable sensor before tasks fail to arrive, which ensures that the sensor can achieve a good load balance and extend network lifetime. A simulation experiment is conducted, and results validate the proposed algorithm. The energy consumption of mobile sensor nodes is effectively balanced. The path-planning algorithm standardizes the energy consumption of each mobile sensor node across the network , thereby effectively prolonging network lifetime.


Author(s):  
Abdul Fuad Abdul Rahman ◽  
Azni Ab Halim ◽  
Nurul Syazwani ◽  
Maslina Daud ◽  
Madihah Zulfa Mohamad ◽  
...  

ABSTRACT Objective - The objective of this paper is to propose a lightweight IDS algorithm to secure IoT Sensor Node. Methodology/Technique - The proposed IDS algorithm for IoT Sensor Node shall prevent the abnormal energy consumption by monitoring, calculating, and evaluating energy drop from each cluster nodes based on a few conditions. Findings - The DoS attack is considered as one of security threat that may affect the quality service of IoT network and also reduce the lifespan of IoT Sensor Nodes Novelty - The approach is using data from previous experiments and translated it to develop mitigation to secure IoT Sensor Node, thus increased the lifespan of IoT Sensor Nodes. Type of Paper: Other. Keywords: Internet of Things (IoT); Intrusion Detection System (IDS); Denial of Service (DoS); Smart Water; Sensor.


2002 ◽  
Vol 11 (04) ◽  
pp. 351-363 ◽  
Author(s):  
WEI-CHUNG CHENG ◽  
MASSOUD PEDRAM

Microprocessors with built-in Liquid Crystal Device (LCD) controllers and equipped with Flash ROM are common in mobile computing applications. In the first part of the paper, a software-only encoding technique is proposed to reduce the power consumption of the processor-memory bus when displaying an image on the LCD. Based on the translation mechanism of the LCD controller, the approach of this paper is to start with the palette as a coding table for the pixel buffer and then reassign the codes according to the image characteristics. Experimental results prove the efficacy of this approach; power reduction reaches 29% for text-based and 17% for graphics-based images. In the second part of the paper, another software-only encoding technique is presented to reduce the transitions on the processor-Compact Flash bus. The device driver in a Linux operating system is modified to perform Bus-Invert encoding when the data is read from or written to a Compact Flash file system. With minimal software overhead, the transitions on the bus are reduced by up to 25%.


2016 ◽  
Author(s):  
Andrew D. Kern ◽  
Daniel R. Schrider

AbstractSummaryHere we describe discoal, a coalescent simulator able to generate population samples that include selective sweeps in a feature-rich, flexible manner. discoal can perform simulations conditioning on the fixation of an allele due to drift or either hard or soft selective sweeps—even those occurring a large genetic distance away from the simulated locus. discoal can simulate sweeps with recurrent mutation to the adaptive allele, recombination, and gene conversion, under nonequilibrium demographic histories and without specifying an allele frequency trajectory in advance.Availability and ImplementationAvailability and implementation: discoal is implemented in the C programming language. Source code is freely available on GitHub (https://github.com/kernlab/discoal_multipop) under a GNU General Public [email protected] informationSupplementary Figures and Text are appended below


Sign in / Sign up

Export Citation Format

Share Document