IoT
Latest Publications


TOTAL DOCUMENTS

71
(FIVE YEARS 70)

H-INDEX

2
(FIVE YEARS 2)

Published By Mdpi Ag

2624-831x

IoT ◽  
2021 ◽  
Vol 3 (1) ◽  
pp. 73-90
Author(s):  
Yann Stephen Mandza ◽  
Atanda Raji

In developing countries today, population growth and the penetration of higher standard of living appliances in homes has resulted in a rapidly increasing residential load. In South Africa, the recent rolling blackouts and electricity price increase only highlighted this reality, calling for sustainable measures to reduce overall consumption and peak load. The dawn of the smart grid concept, embedded systems, and ICTs have paved the way for novel Home Energy Management Systems (HEMS) design. In this regard, the Internet of Things (IoT), an enabler for intelligent and efficient energy management systems, is the subject of increasing attention for optimizing HEMS design and mitigating its deployment cost constraints. In this work, we propose an IoT platform for residential energy management applications focusing on interoperability, low cost, technology availability, and scalability. We addressed the backend complexities of IoT Home Area Networks (HAN) using the Open Consortium Foundation (OCF) IoTivity-Lite middleware. To augment the quality, servicing, reduce the cost, and the development complexities, this work leverages open-source cloud technologies from Back4App as Backend-as-a-Service (BaaS) to provide consumers and utilities with a data communication platform within an experimental study illustrating time and space agnostic “mind-changing” energy feedback, Demand Response Management (DRM) under a peak shaving algorithm yielded peak load reduction around 15% of the based load, and appliance operation control using a HEM App via an Android smartphone.


IoT ◽  
2021 ◽  
Vol 3 (1) ◽  
pp. 60-72
Author(s):  
Davi V. Q. Rodrigues ◽  
Delong Zuo ◽  
Changzhi Li

Researchers have made substantial efforts to improve the measurement of structural reciprocal motion using radars in the last years. However, the signal-to-noise ratio of the radar’s received signal still plays an important role for long-term monitoring of structures that are susceptible to excessive vibration. Although the prolonged monitoring of structural deflections may provide paramount information for the assessment of structural condition, most of the existing structural health monitoring (SHM) works did not consider the challenges to handle long-term displacement measurements when the signal-to-noise ratio of the measurement is low. This may cause discontinuities in the detected reciprocal motion and can result in wrong assessments during the data analyses. This paper introduces a novel approach that uses a wavelet-based multi-resolution analysis to correct short-term distortions in the calculated displacements even when previously proposed denoising techniques are not effective. Experimental results are presented to validate and demonstrate the feasibility of the proposed algorithm. The advantages and limitations of the proposed approach are also discussed.


IoT ◽  
2021 ◽  
Vol 3 (1) ◽  
pp. 29-59
Author(s):  
Hossein Hassani ◽  
Nadejda Komendantova ◽  
Daniel Kroos ◽  
Stephan Unger ◽  
Mohammad Reza Yeganegi

The importance of energy security for the successful functioning of private companies, national economies, and the overall society cannot be underestimated. Energy is a critical infrastructure for any modern society, and its reliable functioning is essential for all economic sectors and for the well-being of everybody. Uncertainty in terms of the availability of information, namely reliable data to make predictions and to plan for investment as well as for other actions of stakeholders in the energy markets is one of the factors with the highest influence on energy security. This uncertainty can be connected with many factors, such as the availability of reliable data or actions of stakeholders themselves. For example, the recent outbreak of the COVID-19 pandemic revealed negative impacts of uncertainty on decision-making processes and markets. At the time point when the market participants started to receive real-time information about the situation, the energy markets began to ease. This is one scenario where Big Data can be used to amplify information to various stakeholders to prevent panic and to ensure market stability and security of supply. Considering the novelty of this topic, our methodology is based on the meta-analysis of existing studies in the area of impacts of energy security on private companies, the national economy, and society. The results show that, in a fast-paced digital world characterized by technological advances, the use of Big Data technology provides a unique niche point to close this gap in information disparity by levering the use of unconventional data sources to integrate technologies, stakeholders, and markets to promote energy security and market stability. The potential of Big Data technology is yet to be fully utilized. Big Data can handle large data sets characterized by volume, variety, velocity, value, and complexity. Our conclusion is that the challenge for energy markets is to leverage this technology to mine available socioeconomic, political, geographic, and environmental data responsibly and to provide indicators that predict future global supply and demand. This information is crucial for energy security and ensuring global economic prosperity.


IoT ◽  
2021 ◽  
Vol 3 (1) ◽  
pp. 1-28
Author(s):  
Mario Noseda ◽  
Lea Zimmerli ◽  
Tobias Schläpfer ◽  
Andreas Rüst

New protocol stacks provide wireless IPv6 connectivity down to low power embedded IoT devices. From a security point of view, this leads to high exposure of such IoT devices. Consequently, even though they are highly resource-constrained, these IoT devices need to fulfil similar security requirements as conventional computers. The challenge is to leverage well-known cybersecurity techniques for such devices without dramatically increasing power consumption (and therefore reducing battery lifetime) or the cost regarding memory sizes and required processor performance. Various semiconductor vendors have introduced dedicated hardware devices, so-called secure elements that address these cryptographic challenges. Secure elements provide tamper-resistant memory and hardware-accelerated cryptographic computation support. Moreover, they can be used for mutual authentication with peers, ensuring data integrity and confidentiality, and various other security-related use cases. Nevertheless, publicly available performance figures on energy consumption and execution times are scarce. This paper introduces the concept of secure elements and provides a measurement setup for selected individual cryptographic primitives and a DTLS handshake over CoAPs in a realistic use case. Consequently, the paper presents quantitative results for the performance of five secure elements. Based on these results, we discuss the characteristics of the individual secure elements and supply developers with the information needed to select a suitable secure element for a specific application.


IoT ◽  
2021 ◽  
Vol 2 (4) ◽  
pp. 761-785
Author(s):  
Kosuke Ito ◽  
Shuji Morisaki ◽  
Atsuhiro Goto

This study proposes a security-quality-metrics method tailored for the Internet of things (IoT) and evaluates conformity of the proposed approach with pertinent cybersecurity regulations and guidelines for IoT. Cybersecurity incidents involving IoT devices have recently come to light; consequently, IoT security correspondence has become a necessity. The ISO 25000 series is used for software; however, the concept of security as a quality factor has not been applied to IoT devices. Because software vulnerabilities were not the device vendors’ responsibility as product liability, most vendors did not consider the security capability of IoT devices as part of their quality control. Furthermore, an appropriate IoT security-quality metric for vendors does not exist; instead, vendors have to set their security standards, which lack consistency and are difficult to justify by themselves. To address this problem, the authors propose a universal method for specifying IoT security-quality metrics on a globally accepted scale, inspired by the goal/question/metric (GQM) method. The method enables vendors to verify their products to conform to the requirements of existing baselines and certification programs and to help vendors to tailor their quality requirements to meet the given security requirements. The IoT users would also be able to use these metrics to verify the security quality of IoT devices.


IoT ◽  
2021 ◽  
Vol 2 (4) ◽  
pp. 741-760
Author(s):  
Konstantina Zachila ◽  
Konstantinos Kotis ◽  
Evangelos Paparidis ◽  
Stamatia Ladikou ◽  
Dimitris Spiliotopoulos

Nowadays, cultural spaces (e.g., museums and archaeological sites) are interested in adding intelligence in their ecosystem by deploying different types of smart applications such as automated environmental monitoring, energy saving, and user experience optimization. Such an ecosystem is better realized through semantics in order to efficiently represent the required knowledge for facilitating interoperability among different application domains, integration of data, and inference of new knowledge as insights into what may have not been observed at first sight. This paper reports on our recent efforts for the engineering of a smart museum (SM) ontology that meets the following objectives: (a) represent knowledge related to trustworthy IoT entities that “live” and are deployed in a SM, i.e., things, sensors, actuators, people, data, and applications; (b) deal with the semantic interoperability and integration of heterogeneous SM applications and data; (c) represent knowledge related to museum visits and visitors toward enhancing their visiting experience; (d) represent knowledge related to smart energy saving; (e) represent knowledge related to the monitoring of environmental conditions in museums; and (f) represent knowledge related to the space and location of exhibits and collections. The paper not only contributes a novel SM ontology, but also presents the updated HCOME methodology for the agile, human-centered, collaborative and iterative engineering of living, reused, and modular ontologies.


IoT ◽  
2021 ◽  
Vol 2 (4) ◽  
pp. 717-740
Author(s):  
Ljiljana Stojanovic ◽  
Thomas Usländer ◽  
Friedrich Volz ◽  
Christian Weißenbacher ◽  
Jens Müller ◽  
...  

The concept of digital twins (DT) has already been discussed some decades ago. Digital representations of physical assets are key components in industrial applications as they are the basis for decision making. What is new is the conceptual approach to consider DT as well-defined software entities themselves that follow the whole lifecycle of their physical counterparts from the engineering, operation up to the discharge, and hence, have their own type description, identity, and lifecycle. This paper elaborates on this idea and argues the need for systematic DT engineering and management. After a conceptual description of DT, the paper proposes a DT lifecycle model and presents methodologies and tools for DT management, also in the context of Industrie 4.0 concepts, such as the asset administration shell (AAS), the international data spaces (IDS), and IEC standards (such as OPC UA and AML). As a tool example for the support of DT engineering and management, the Fraunhofer-advanced AAS tools for digital twins (FA3ST) are presented in more detail.


IoT ◽  
2021 ◽  
Vol 2 (4) ◽  
pp. 688-716
Author(s):  
Rachel M. Billings ◽  
Alan J. Michaels

While a variety of image processing studies have been performed to quantify the potential performance of neural network-based models using high-quality still images, relatively few studies seek to apply those models to a real-time operational context. This paper seeks to extend prior work in neural-network-based mask detection algorithms to a real-time, low-power deployable context that is conducive to immediate installation and use. Particularly relevant in the COVID-19 era with varying rules on mask mandates, this work applies two neural network models to inference of mask detection in both live (mobile) and recorded scenarios. Furthermore, an experimental dataset was collected where individuals were encouraged to use presentation attacks against the algorithm to quantify how perturbations negatively impact model performance. The results from evaluation on the experimental dataset are further investigated to identify the degradation caused by poor lighting and image quality, as well as to test for biases within certain demographics such as gender and ethnicity. In aggregate, this work validates the immediate feasibility of a low-power and low-cost real-time mask recognition system.


IoT ◽  
2021 ◽  
Vol 2 (4) ◽  
pp. 669-687
Author(s):  
Kiernan George ◽  
Alan J. Michaels

This paper focuses on a block cipher adaptation of the Galois Extension Fields (GEF) combination technique for PRNGs and targets application in the Internet of Things (IoT) space, an area where the combination technique was concluded as a quality stream cipher. Electronic Codebook (ECB) and Cipher Feedback (CFB) variations of the cryptographic algorithm are discussed. Both modes offer computationally efficient, scalable cryptographic algorithms for use over a simple combination technique like XOR. The cryptographic algorithm relies on the use of quality PRNGs, but adds an additional layer of security while preserving maximal entropy and near-uniform distributions. The use of matrices with entries drawn from a Galois field extends this technique to block size chunks of plaintext, increasing diffusion, while only requiring linear operations that are quick to perform. The process of calculating the inverse differs only in using the modular inverse of the determinant, but this can be expedited by a look-up table. We validate this GEF block cipher with the NIST test suite. Additional statistical tests indicate the condensed plaintext results in a near-uniform distributed ciphertext across the entire field. The block cipher implemented on an MSP430 offers a faster, more power-efficient alternative to the Advanced Encryption Standard (AES) system. This cryptosystem is a secure, scalable option for IoT devices that must be mindful of time and power consumption.


IoT ◽  
2021 ◽  
Vol 2 (4) ◽  
pp. 656-668
Author(s):  
Charalampos Orfanidis ◽  
Atis Elsts ◽  
Paul Pop ◽  
Xenofon Fafoutis

Time Slotted Channel Hopping (TSCH) is a medium access protocol defined in the IEEE 802.15.4 standard. It has proven to be one of the most reliable options when it comes to industrial applications. TSCH offers a degree of high flexibility and can be tailored to the requirements of specific applications. Several performance aspects of TSCH have been investigated so far, such as the energy consumption, reliability, scalability and many more. However, mobility in TSCH networks remains an aspect that has not been thoroughly explored. In this paper, we examine how TSCH performs under mobility situations. We define two mobile scenarios: one where autonomous agriculture vehicles move on a predefined trail, and a warehouse logistics scenario, where autonomous robots/vehicles and workers move randomly. We examine how different TSCH scheduling approaches perform on these mobility patterns and when a different number of nodes are operating. The results show that the current TSCH scheduling approaches are not able to handle mobile scenarios efficiently. Moreover, the results provide insights on how TSCH scheduling can be improved for mobile applications.


Sign in / Sign up

Export Citation Format

Share Document