communication protocol
Recently Published Documents





Chavala Lakshmi Narayana ◽  
Rajesh Singh ◽  
Anita Gehlot

These days, the oil industrial industry is leaning toward employing smart field improvements to streamline various activities in the midstream area. Oil transportation over large distances via pipelines has a cheap cost and high efficiency in this sector. If pipelines are not properly maintained, they may fail, potentially causing catastrophic, long-term, and irreversible consequences on both natural and human conditions. Low power wide area networks (LPWANs) are without a doubt one of the domains that cause the most from industrial fields when it comes to realizing the vision of the internet of things (IoT). Long-range (LoRa) is an emerging LPWAN technology that is particularly useful for transmitting data over long distances. The goal of this work is to offer a methodology for managing oil pipelines over long distances utilizing the LoRa communication protocol and the installation of sensor nodes and LoRa gateways along the pipeline. We also used the optimized network engineering tools (OPNET) simulator to examine various simulation findings of LoRa performance.

Sensors ◽  
2022 ◽  
Vol 22 (2) ◽  
pp. 567
Muhammad Husnain ◽  
Khizar Hayat ◽  
Enrico Cambiaso ◽  
Ubaid U. Fayyaz ◽  
Maurizio Mongelli ◽  

The advancement in the domain of IoT accelerated the development of new communication technologies such as the Message Queuing Telemetry Transport (MQTT) protocol. Although MQTT servers/brokers are considered the main component of all MQTT-based IoT applications, their openness makes them vulnerable to potential cyber-attacks such as DoS, DDoS, or buffer overflow. As a result of this, an efficient intrusion detection system for MQTT-based applications is still a missing piece of the IoT security context. Unfortunately, existing IDSs do not provide IoT communication protocol support such as MQTT or CoAP to validate crafted or malformed packets for protecting the protocol implementation vulnerabilities of IoT devices. In this paper, we have designed and developed an MQTT parsing engine that can be integrated with network-based IDS as an initial layer for extensive checking against IoT protocol vulnerabilities and improper usage through a rigorous validation of packet fields during the packet-parsing stage. In addition, we evaluate the performance of the proposed solution across different reported vulnerabilities. The experimental results demonstrate the effectiveness of the proposed solution for detecting and preventing the exploitation of vulnerabilities on IoT protocols.

2022 ◽  
Vol 70 (1) ◽  
pp. 601-618
Navid Ali Khan ◽  
N. Z. Jhanjhi ◽  
Sarfraz Nawaz Brohi ◽  
Abdulwahab Ali Almazroi ◽  
Abdulaleem Ali Almazroi

2022 ◽  
Vol 2161 (1) ◽  
pp. 012041
A Banerjee ◽  
A V Jindal ◽  
A Shankar ◽  
V Sachdeva ◽  
M Kanthi

Abstract The paper describes the design and working of a motorsport data acquisition, logging, live telemetry, and display system developed using the Controller Area Network (CAN) communication protocol as the backbone of the arrangement. The main controller of the CAN system is the myRIO which was programmed using LabVIEW. A Formula One car hosts over a hundred sensors during each of its races. The data acquisition/logging system, although does not directly affect the car’s performance, is indispensable when it comes to the testing and design phase of the car. Designers can validate their assumptions and calculations, real-time data during testing can be a safety indicator and it provides insight to the driver about the performance of the vehicle. The FPGA-based controller for CAN is designed for data acquisition and live telemetry system with the interest of the formula car team in mind. The design choices were made to improve and deliver a more effective system than the pre-existing ones. All choices of controllers, sensors, formatting were custom made for the requirements of the team. All programmable devices were coded individually to suit the system and the graphical user interface was designed internally. Data acquired by the proposed system helps in making sure that the car achieves the goals that were envisioned when it was designed.

The problem of this research focuses on the communication between the organizing center and the external tutors at practicum centers. A non-experimental methodology is followed to explore the connections between the different variables. Six correlations between the following variables stand out. Positive correlation: gender with sports specialty, academic degree with distance training expertise, and age with collaboration with the organization. Negative correlation: sportive degree with needed training and received information; and, collaboration with the organization with received information. In addition, a dendrogram was constructed from the qualitative question with five large nodules. The results indicate that tutors do not receive information and that they are not related to the organization at any of the formative moments. It would be convenient to prepare a communication protocol where all participants could contribute from different points of view.

2022 ◽  
Vol 10 (01) ◽  
pp. 42-56
Youhai Shao ◽  
Yong Wang ◽  
Yun Yang ◽  
Xiang Wang

Electronics ◽  
2021 ◽  
Vol 11 (1) ◽  
pp. 70
Axelle Hue ◽  
Gaurav Sharma ◽  
Jean-Michel Dricot

The growing expectations for ubiquitous sensing have led to the integration of countless embedded sensors, actuators, and RFIDs in our surroundings. Combined with rapid developments in high-speed wireless networks, these resource-constrained devices are paving the road for the Internet-of-Things paradigm, a computing model aiming to bring together millions of heterogeneous and pervasive elements. However, it is commonly accepted that the Privacy consideration remains one of its main challenges, a notion that does not only encompasses malicious individuals but can also be extended to honest-but-curious third-parties. In this paper, we study the design of a privacy-enhanced communication protocol for lightweight IoT devices. Applying the proposed approach to MQTT, a highly popular lightweight publish/subscribe communication protocol prevents no valuable information from being extracted from the messages flowing through the broker. In addition, it also prevents partners re-identification. Starting from a privacy-ideal, but unpractical, exact transposition of the Oblivious Transfer (OT) technology to MQTT, this paper follows an iterative process where each previous model’s drawbacks are appropriately mitigated all the while trying to preserve acceptable privacy levels. Our work provides resistance to statistical analysis attacks and dynamically supports new client participation. Additionally the whole proposal is based on the existence of a non-communicating 3rd party during pre-development. This particular contribution reaches a proof-of-concept stage through implementation, and achieves its goals thanks to OT’s indistinguishability property as well as hash-based topic obfuscations.

Sign in / Sign up

Export Citation Format

Share Document