Internet De Les Coses : Arquitectures, Protocols I Aplicacions

Total Page:16

File Type:pdf, Size:1020Kb

Internet De Les Coses : Arquitectures, Protocols I Aplicacions L’Internet de les Coses: arquitectures, protocols i aplicacions Estudiant: Mario Pareja Nieto MUET UOC-URL Setembre 2014 – Gener 2015 Consultor: Pere Tuset Peiró 11 de Gener de 2015 Pàgina 2 Resum Les demandes d’informació de la societat actual són cada cop més elevades, creixen inexorablement dia a dia. La principal premisa que ens trobem és que, a través del tractament i anàlisi d’aquesta informació es podrà obtenir un major coneixement del medi que ens envolta. Al seu torn, la intenció final és que aquest major grau coneixement repercutirà, d’una manera o altra, en majors beneficis per als individus i per la societat en general; en definitiva, una major qualitat de vida. Més informació comporta més comunicació mitjançant mitjans telemàtics, per tal de que els usuaris puguin comunicar-se entre ells o bé amb les màquines, segons l’esquema tradicional de comunicació home-home o home-màquina. Per la seva banda i, sense cap mena de dubte, avui dia la principal xarxa global de comunicacions és Internet, tant en l’àmbit personal com a professional. Per tant, tenim que la majòria de les comunicacions usuari-usuari o usuari- màquina que es realitzen avui dia ho fan a través d’aquesta xarxa global. L’Internet de les Coses (IoT o Internet of Things, en anglès) és un concepte encara prou recent, que representa un pas més enllà en les comunicacions a la Xarxa, segons el qual aquestes darreres passen a ser directament màquina a màquina (M2M o Machine-To-Machine, en anglès) i sense cap tipus d’interacció per part de cap usuari. En la pràctica, això significa, en realitat, millions de dispositius de tota mena –equipats amb tot tipus de sensors, moltes vegades minúsculs de baix consum, de la mida d’una “mota” de pols- i que formen xarxes de sensors sense fils (WSN o Wireless Sensor Networks, en anglès) que es connecten a Internet, fent servir tecnologies com Bluetooth LE, ZigBee, Wi-Fi, etc.i posteriorment amb altres dispositius (per exemple, actuadors, servidors web o de bases de dades) per tal d’intercanviar informació. Això ha estat possible gràcies a la progressiva disminució dels costos de les comunicacions, així com dels costos de fabricació de l’electrònica necessària per “sensoritzar” (els nodes normalment s’implementen fent servir circuits integrats del tipus ‘Sistema en un Xip’ (SoC o System on a Chip, en anglès) i, en paral·lel, gràcies al progressiu augment de potència d’aquests darrers. Alguns dels reptes més importants amb els qualss’enfronta aquesta nova forma de comunicació són: Estandarització de les comunicacions a les xarxes sense fils personals (WPAN o Wireless Area Personal Networks, en anglès). Per tal d’evitar la confusió originada per l’aparació de diverses tecnologies similars, molts cops propietàries, es va crear 802.15.4, que és un estàndarde l’IEEE (Institute of Electrical and Electronics Engineers) que defineix el nivell físic (PHY) i el control d’accés al medi (MAC) a WPANs amb baixes taxes de transmissió (fins 250 Kbps) i baix consum. Altres alternatives possibles passen, per exemple, per l’ús de l’estàndard Bluetooth Low Energy (BLE). Pàgina 3 Manca d’adreces IPv4 per als milers de millions de dispositius que es poden arribar a connectar a la Xarxa, fet que fa imprescindible que l’Internet de les Coses estigui basada en IPv6, ja que d’aquesta manera es pot suportar un total de 2128 adreces públiques. D’aquesta manera, s’ha de parlar de protocols com ara 6LowPAN (IPv6 over Low power Wireless Personal Area Networks), una implementació de IPv6 –capa d’adaptació- específica per a xarxes de sensors sense fils de baix consum i amb pèrdues. Assegurar un grau de seguretat el suficientment alt a l’hora de connectar els dispositius a Internet, donat que moltes vegades les dades que viatjaran seran sensibles (per exemple paràmetres de salut d’un pacient, si una casa es troba buida o no, etc). Per a aquest fi, seran necessaris protocols de securetat i de control d’accés al medi com ara 802.11i (WPA2) i 802.1AE (MACsec), així com mètodes d’encriptació (AES) que han sigut desenvolupat per tal d’assegurar dades en entorns sense fils i en moviment. Assegurar fiabilitat en les comunicacions. Donat que el medi que es fa servir és l’aire i, per tant, estem parlant de xarxes amb pèrdules (lossy networks, en anglès) s’ha de trobar nous mecanismes que permetin disminuir la probabilitat d’error en l’enviament de paquets el màxim possible o, dit d’una altra manera, que permetin augmentar l’eficiència de dades enviades en entorns “hostils” on pot haver-hi interferències (jamming, en anglès) ocasionades per obstacles, vehicles, maquinària industrial, etc. Alguns clars exemplesde protocols orientats a aquest fi són CoAP (Constrained Application Protocol) i MQTT (Message Queuing Telemetry Transport). Assegurar el correct encaminament dels paquets en entorns com el descrit anteriorment. En aquest tipus de xarxes de tant curt abast, entre d’altres, l’encaminament (routing, en anglès) ha de ser dinàmic i proactiu i ha de permetremúltiples salts entre diferents nodes (multi-hop, en anglès) per tal de salvar majors distàncies i així poder arribar a la destinació – normalment una pasarel·la cap a Internet. Un clar exemple el tenim amb RPL (Routing Protocol for Low-Power and Lossy Networks), que és el protocol estàndard d’IPv6 per a aquest fi. El ventall d’aplicacions que podem trober en una Internet de les Coses és pràcticament il·limitat: des de els wearables (peces de robes amb de sensors que poden mesurar la temperatura corporal, humitat, calòries consumides, sensació de fred, etc.) fins al monitoratge de la salut de persones depenents, passant per la domòtica (o el que és el mateix, automatització de la casa, amb rentadores, frigorífics o sistemes de calefacció amb sensors que controlen la bugada, la quantitat de menjar que tenim o la temperatura de la casa), aplicacions vehiculars (sensors als cotxes que mesuren el tipus de conducció de l’usuari i que poden fer-se servir per dissenyar nous plans de pagament per part de les companyies d’assegurances), monitoratge i control del trànsit a la ciutat (una dels típics exemples per definir el concepte de Ciutat Intel·ligents o Smart Cities, en anglès), monitoratge de conreus i granjes, etc. Paraules clau: IEEE 802.15.4e, TSCH, 6LoWPAN, RPL, CoAP, CC2538, OpenMote, OpenWSN. Pàgina 4 Abstract Information needs in today’s society are increasing from day to day, relentlessly. The main premise here is that, through dataprocessing and analysis, knowledge is extracted. In turn, the final aim of extracting knowledge from our environment is to rebound, some way or another, in benefits for both individuals in particular and society in general. In other words: more info means more knowledge and more knowledge can lead, eventually, to a higher quality of life. More info implies more telematics, so that the end users can communicate remotely to each other (user-to-user schema) or to a machine (user-to-machine schema). These are the traditional ways individuals can communicate at present. On the other hand and, with no doubt, Internet is, on these days, the main global network everyone -both for personal and professional reasons- uses on a daily basis. Then, we have that almost all of the user-to-user or user-to-machine communications are already being carried out through the Internet. The Internet of Things (hereinafter IoT) is a new concept perhaps a little ambiguous or “ethereal” yet, which represents one step further to traditional Internet communications. On the IoT, communications are carried out directly between machines (M2M or Machine-to- Machine) with no interaction or control at all by any user. In practice, this means, in the real world, billions of devices of any kind -equipped with several types of sensors, most of the times tiny and low-powered ones, called “motes”- meshed together in what is generically called a Wireless Sensor Network (WSN), by means of wireless technologies (Bluetooth LE, ZigBee, Wi-Fi, ...) and connected to the Internet and then, on the other end, to other devices (for example actuators, web servers or database servers) in order to store or exchange information. This has been possible thanks to the progressive reduction on communications’ costs, as well as progressively decreasing costs on electronics’ manufacturing (wireless nodes are normally deployed by using ‘Systems on a Chip’ –SoC- based ICs). Some of the most important challenges this new paradigm of communication must face are the following: Wireless personal area networks’ (WPAN) standardization. In order to prevent the confusion originated by multiple emerging and similar technologies, most of the times propietary ones, the standard 802.15.4 was created by the IEEE (Institute of Electrical and Electronics Engineering), which defines physical and access media layers for WPANs with low data rates (up to 250 Kbps) and low power consumption. Possible alternatives to this standard are, for example, the new Bluetooth Low Energy (BLE) standard. IPv4 address exhaustion or, in other words, not enough addresses to handle billions of devices that could be connected to the Network in the next years. This big issue makes imperative the use of IPv6 for this new IoT paradigm, which can support up to 2128 public addresses. Additionally, it is necessary to introduce 6LoWPAN protocol, which is nothing but an IPv6 implementation specifically created for low-powered wireless sensor networks (WSN). Pàgina 5 To be able to fulfill a high security level when connecting devices to the Internet, enough to ensure confidentiality of sensible data (pacients’ health information, whether somebody’s at home or not, etc.). To this extent, security and media access control protocols will be needed like 802.11i (WPA2) and 802.1AE (MACsec) will be needed, as well as encryption methods (AES) which have been developed to protect data on wireless and “in motion” environments.
Recommended publications
  • A Holistic Framework for Open Low-Power Internet of Things
    A Holistic Framework for Open Low-Power Internet of Things Technology Ecosystems Peng Hu1, Member, IEEE Abstract The low-power Internet of Things (IoT) has been thriving because of the recent technological advancement and ecosystems meeting the vertical application requirements and market needs. An open IoT technology ecosystem of the low-power IoT has become increasingly important to all the players and stakeholders and to the research community. However, there are several mainstream low-power IoT ecosystems available out of industry consortia or research projects and there are different models implied in them. We need to identify the working framework behind the scene and find out the principle of driving the future trends in the industry and research community. With a close look at these IoT technology ecosystems, four major business models are identified that can lead to the proposed ecosystem framework. The framework considers the technical building blocks, market needs, and business vertical segments, where these parts are making the IoT evolve as a whole for the years to come. I. Introduction Internet advances with the openness in mind, so does the Internet of Things (IoT). An IoT system benefit from various kinds of technologies and developmental efforts driven by open IoT technology ecosystems involving open standards, open source tools, and open platforms with key stakeholders. Over the past decade, the innovative sensors, embedded systems, cloud computing, wireless networking technologies have been enriching the openness of IoT systems and fulfilling the needs of IoT system development. As a result, on the one hand, these technologies enable the extremely less power consumption on IoT devices than before, which enables a broad spectrum of zero-battery and battery-powered applications.
    [Show full text]
  • Wireless Sensor Networks Technology and Simulation Software’S
    ISSN (Online) 2278-1021 IJARCCE ISSN (Print) 2319 5940 International Journal of Advanced Research in Computer and Communication Engineering Vol. 5, Issue 5, May 2016 An Overview on Wireless Sensor Networks Technology and Simulation Software’s Vijay S. Kale1, Rohit D. Kulkarni2 Associate Professor, Department of Electronic Science, KTHM College, Nashik, Maharashtra, India1 M. Phil. Student, Department of Electronic Science, KTHM College, Nashik, Maharashtra, India2 Abstract: Advances in wireless networking, micro-fabrication and integration of sensors and actuators manufactured using micro-electromechanical system (MEMS) technology and embedded microprocessors have enabled a new generation of massive-scale sensor networks suitable for a range of commercial and military applications. Sensor networks promise to couple end users directly to sensor measurements and provide information that is precisely localized in time and/or space, according to the user’s needs or demands. Node-level design simulators simulate the behaviour of a sensor network on a per-node basis. Using simulation, designers can quickly study the performance in terms of timing, power, bandwidth, and scalability without implementing them on actual hardware and dealing with the actual physical phenomena. The present communication gives the brief survey of wireless sensor network (WSN), WSN components, details of operating systems (TinyOS, RIOT, Nano-RK, MANTIS etc.) and WSN simulation software’s (NS2, OMNET++, J-Sim, JiST, GloMoSim, SSFNet etc.). The aim is to provide a better understanding of the current research issues in this field and outline the use of certain tools to meet the design objectives which will be useful to learner/researcher to develop WSNs applications. Keywords: Sensor nodes, Architecture, Operating system, Simulation software, Wireless technology.
    [Show full text]
  • Deployment of Tinyos for Online Water Sensing
    TELKOMNIKA Indonesian Journal of Electrical Engineering Vol.12, No.6, June 2014, pp. 4802 ~ 4807 DOI: 10.11591/telkomnika.v12i6.5525 4802 Deployment of TinyOS for Online Water Sensing Xin Wang*, Pan Xu Key Laboratory of Advanced Process Control for Light Industry (Ministry of Education), Jiangnan University, Wuxi 214122, PR China *Corresponding author, e-mail: [email protected] Abstract Current quality assessment methods of water parameters are mainly laboratory based, require fresh supplies of chemicals, trained staff and are time consuming. Sensor networks are great alternatives for such requirements. We present a practical application of wireless networks: a remote water monitoring system running TinyOS. The contents of several chemicals in the water are sensed and transmitted. The sensor data are collected and transmitted via ZigBee and GPRS. Instead of focusing on theoretic issues such as routing algorithms, network lifetime and so on, we investigate special techniques involved in the implementation of the system while employing TinyOS and its special programming language. Keywords: TinyOS, hierarchical network, embedded operating system, water sensing 1. Introduction TinyOS is an open source, BSD-licensed operating system designed for low-power wireless devices, such as those used in sensor networks, ubiquitous computing, personal area networks, smart buildings, and smart meters. To confront the water pollution, various water monitoring systems based on cellular mobile network have been developed [1, 2]. These systems may assist environmental protection agencies in providing continuous water monitoring with minimum interaction of man interference. But, with such systems, the rare channel resources and hardware are greatly wasted when the monitoring nodes are distributed in higher density.
    [Show full text]
  • Wireless Communication : Wi-Fi, Bluetooth, IEEE 802.15.4, DASH7
    Wireless Communication : Wi-Fi, Bluetooth, IEEE 802.15.4, DASH7 Helen Fornazier, Aurélien Martin, Scott Messner 16 march 2012 Abstract This article has for objective to introduce the basic concepts of and to compare dierent wireless technologies applied to embedded systems. It focuses on Wi-Fi, Bluetooth, IEEE 802.15.4 and Dash7. For each technology, this article covers multiplexing, topology, range, energy consumption, data rate, application, security and peculiarities. At the end of the article, the developer should be able to choose the best wireless technology for their own embedded application and have a basic notion as to how to integrate the technology into their system. Contents 1 Introduction 3 2 Wi-Fi 3 2.1 Origins . 3 2.2 Frequency Channels . 4 2.3 Multiplexing . 4 2.4 Network Topology . 4 2.4.1 Infrastructure Topology (Point-to-Point or Point- to-Multipoint) . 4 2.4.2 Ad-Hoc Topology . 5 2.5 Layers Denitions . 5 2.6 Range, Power Consumption, Data Rate . 8 2.7 Security . 8 2.8 Particularities and Embedded Applications . 8 2.8.1 Wi-Fi Conguration Interface . 10 2.8.2 Embedded Software integration . 10 2.8.3 Other Considerations . 10 2.8.4 Applications of Ad Hoc: Wi-Fi Direct . 12 3 Bluetooth 12 3.1 Origins . 12 3.2 Frequency Channels . 12 3.3 Multiplexing . 13 1 3.4 Network Topology . 13 3.4.1 Piconet Topology . 13 3.4.2 Scatternet Topology . 13 3.5 Layers Denitions . 13 3.5.1 The Bluetooth Controller . 15 3.5.2 The Bluetooth Host .
    [Show full text]
  • Source Code Vulnerabilities in Iot Software Systems
    Advances in Science, Technology and Engineering Systems Journal Vol. 2, No. 3, 1502-1507 (2017) ASTESJ www.astesj.com ISSN: 2415-6698 Special Issue on Recent Advances in Engineering Systems Source Code Vulnerabilities in IoT Software Systems Saleh Mohamed Alnaeli*,1, Melissa Sarnowski2, Md Sayedul Aman3, Ahmed Abdelgawad3, Kumar Yelamarthi3 1CSEPA, University of Wisconsin-Colleges, 53715, USA 2Computer Science, University of Wisconsin-Fox Valley, 54952, USA 3College of Science and Engineering, Central Michigan University, 48859, USA A R T I C L E I N F O A B S T R A C T Article history: An empirical study that examines the usage of known vulnerable statements in software Received: 02 June, 2017 systems developed in C/C++ and used for IoT is presented. The study is conducted on 18 Accepted: 21 July, 2017 open source systems comprised of millions of lines of code and containing thousands of Online: 15 August, 2017 files. Static analysis methods are applied to each system to determine the number of unsafe commands (e.g., strcpy, strcmp, and strlen) that are well-known among research Keywords: communities to cause potential risks and security concerns, thereby decreasing a system’s unsafe commands robustness and quality. These unsafe statements are banned by many companies (e.g., vulnerable software Microsoft). The use of these commands should be avoided from the start when writing code scientific and should be removed from legacy code over time as recommended by new C/C++ security language standards. Each system is analyzed and the distribution of the known unsafe static analysis commands is presented.
    [Show full text]
  • A Long-Distance RF-Powered Sensor Node with Adaptive Power Management for Iot Applications
    sensors Article A Long-Distance RF-Powered Sensor Node with Adaptive Power Management for IoT Applications Matteo Pizzotti 1,2,* ID , Luca Perilli 1 ID , Massimo del Prete 2, Davide Fabbri 2, Roberto Canegallo 3, Michele Dini 1, Diego Masotti 2 ID , Alessandra Costanzo 1,2, Eleonora Franchi Scarselli 1,2 ID and Aldo Romani 1,2 ID 1 Advanced Research Center on Electronic Systems, University of Bologna, Via Toffano 2/2, Bologna 40126, Italy; [email protected] (L.P.); [email protected] (M.D.); [email protected] (A.C.); [email protected] (E.F.S.); [email protected] (A.R.) 2 Department of Electrical, Electronic, and Information Engineering, University of Bologna, Via Risorgimento 2, Bologna 40126, Italy; [email protected] (M.d.P.); [email protected] (D.F.); [email protected] (D.M.) 3 STMicroelectronics, Via Camillo Olivetti, Agrate Brianza 20864, Italy; [email protected] * Correspondence: [email protected]; Tel.: +39-054-733-9537 Received: 30 June 2017; Accepted: 26 July 2017; Published: 28 July 2017 Abstract: We present a self-sustained battery-less multi-sensor platform with RF harvesting capability down to −17 dBm and implementing a standard DASH7 wireless communication interface. The node operates at distances up to 17 m from a 2 W UHF carrier. RF power transfer allows operation when common energy scavenging sources (e.g., sun, heat, etc.) are not available, while the DASH7 communication protocol makes it fully compatible with a standard IoT infrastructure. An optimized energy-harvesting module has been designed, including a rectifying antenna (rectenna) and an integrated nano-power DC/DC converter performing maximum-power-point-tracking (MPPT).
    [Show full text]
  • Sensor Networks and Their Applications: Investigating the Role of Sensor Web Enablement
    Sensor Networks and Their Applications: Investigating the Role of Sensor Web Enablement A Thesis submitted for the degree of Communications Engineering Doctorate (EngD) Jeffery George Foley Communications & Information Systems Research Group Department of Electronic & Electrical Engineering University College London BT Group plc, BT Centre, 81 Newgate Street, London EC1A 7AJ March 2014 Statement of Originality I, Jeffery George Foley, confirm that the work presented in this thesis is my own. Where information has been derived from other sources, I confirm that this has been indicated in the thesis. Signed: _______________________________ Date: ________________________________ 2 Abstract The Engineering Doctorate (EngD) was conducted in conjunction with BT Research on state-of-the-art Wireless Sensor Network (WSN) projects. The first area of work is a literature review of WSN project applications, some of which the author worked on as a BT Researcher based at the world renowned Adastral Park Research Labs in Suffolk (2004-09). WSN applications are examined within the context of Machine-to-Machine (M2M); Information Networking (IN); Internet/Web of Things (IoT/WoT); smart home and smart devices; BT’s 21st Century Network (21CN); Cloud Computing; and future trends. In addition, this thesis provides an insight into the capabilities of similar external WSN project applications. Under BT’s Sensor Virtualization project, the second area of work focuses on building a Generic Architecture for WSNs with reusable infrastructure and ‘infostructure’ by identifying and trialling suitable components, in order to realise actual business benefits for BT. The third area of work focuses on the Open Geospatial Consortium (OGC) standards and their Sensor Web Enablement (SWE) initiative.
    [Show full text]
  • ECNLP 3 the Workshop on E-Commerce and NLP Proceedings
    ECNLP 3 The Workshop on e-Commerce and NLP Proceedings of the Third Workshop July 10, 2020 c 2020 The Association for Computational Linguistics Order copies of this and other ACL proceedings from: Association for Computational Linguistics (ACL) 209 N. Eighth Street Stroudsburg, PA 18360 USA Tel: +1-570-476-8006 Fax: +1-570-476-0860 [email protected] ISBN 978-1-952148-21-7 ii Introduction It is our great pleasure to welcome you to the Third International Workshop on e-Commerce and NLP (ECNLP). This workshop focuses on intersection of Natural Language Processing (NLP) and e-Commerce. NLP and information retrieval (IR) have been powering e-Commerce applications since the early days of the fields. Today, NLP and IR already play a significant role in e-Commerce tasks, including product search, recommender systems, product question answering, machine translation, sentiment analysis, product description and review summarization, and customer review processing. With the exploding popularity of chatbots and shopping assistants – both text- and voice-based – NLP, IR, question answering, and dialogue systems research is poised to transform e-Commerce once again. The ECNLP workshop series was designed to provide a venue for the dissemination of late-breaking research results and ideas related to e-commerce and online shopping, as well as a forum where new and unfinished ideas could be discussed. After the successful ECNLP workshops at The Web Conference in 2019 and 2020, we are happy to host ECNLP 3 at ACL 2020 and once again bring together researchers from both academia and industry. We have received a larger number of submissions than we could accept for presentation.
    [Show full text]
  • Ondrej Kreibich Wireless Diagnostic Methods in an Aerospace Application
    Czech Technical University in Prague Faculty of Electrical Engineering DOCTORAL THESIS OndˇrejKreibich Wireless diagnostic methods in an aerospace application Department of Measurement Supervisor of the doctoral thesis: doc. Ing. Radislav Sm´ıd,PhD.ˇ Study programme: Electrical Engineering and Information Technology Specialization: Air Traffic Control February 2014 Acknowledgement There are a number of people without whom this thesis might not have been written, and to whom I am greatly indebted. First and foremost, I have to thank my parents and my brother for their love and support throughout my life. A very special acknowledgement goes to my girlfriend Ester, who loved and supported me during the final, critical months of my dissertation. I would like to give my sincerely thanks to my supervisor, Associate Prof. Radislav Smid, PhD., for his guidance and support throughout my studies, and especially for his confidence in me. His comments and questions have helped me greatly in completing the manuscript. I am grateful to him for discussing and inter- preting some of the results presented in this thesis. Finally, my thanks to all my friends who have supported me or influenced me along the way. I declare that I carried out this doctoral thesis independently, and only with the cited sources, literature and other professional sources. In Prague date ............ signature of the author N´azevpr´ace:Metody bezdr´atov´ediagnostiky v leteck´ych aplikac´ıch Autor: Ing. OndˇrejKreibich Katedra: Katedra mˇeˇren´ı, CVUTˇ v Praze, FEL Vedouc´ıdisertaˇcn´ıpr´ace: doc. Ing. Radislav Sm´ıd,Ph.D.,ˇ Katedra mˇeˇren´ı Abstrakt: Strategie pl´anovan´e´udrˇzby je zaloˇzenana pr˚ubˇeˇzn´emsledov´an´ıstavu zaˇr´ızen´ıse syst´ememvˇcasn´ehovarov´an´ıpˇrednestandardn´ımistavy v chov´an´ısle- dovan´ehozaˇr´ızen´ı.
    [Show full text]
  • Évaluation Et Amélioration Des Plates-Formes Logicielles Pour Réseaux De Capteurs Sans-Fil, Pour Optimiser La Qualité De Service Et L’Énergie Kévin Roussel
    Évaluation et amélioration des plates-formes logicielles pour réseaux de capteurs sans-fil, pour optimiser la qualité de service et l’énergie Kévin Roussel To cite this version: Kévin Roussel. Évaluation et amélioration des plates-formes logicielles pour réseaux de capteurs sans- fil, pour optimiser la qualité de service et l’énergie. Autre [cs.OH]. Université de Lorraine, 2016. Français. NNT : 2016LORR0051. tel-01754653 HAL Id: tel-01754653 https://hal.univ-lorraine.fr/tel-01754653 Submitted on 30 Mar 2018 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. AVERTISSEMENT Ce document est le fruit d'un long travail approuvé par le jury de soutenance et mis à disposition de l'ensemble de la communauté universitaire élargie. Il est soumis à la propriété intellectuelle de l'auteur. Ceci implique une obligation de citation et de référencement lors de l’utilisation de ce document. D'autre part, toute contrefaçon, plagiat, reproduction illicite encourt une poursuite pénale. Contact : [email protected] LIENS Code de la Propriété Intellectuelle.
    [Show full text]
  • Content-Centric Networking in the Internet of Things
    Content-Centric Networking in the Internet of Things Otto Waltari Helsinki 25.11.2013 M.Sc. thesis UNIVERSITY OF HELSINKI Department of Computer Science HELSINGIN YLIOPISTO HELSINGFORS UNIVERSITET UNIVERSITY OF HELSINKI Tiedekunta Fakultet Faculty Laitos Institution Department Faculty of Science Department of Computer Science Tekijä Författare Author Otto Waltari Työn nimi Arbetets titel Title Content-Centric Networking in the Internet of Things Oppiaine Läroämne Subject Computer Science Työn laji Arbetets art Level Aika Datum Month and year Sivumäärä Sidoantal Number of pages M.Sc. thesis 25.11.2013 45 sivua Tiivistelmä Referat Abstract Advanced low-cost wireless technologies have enabled a huge variety of real life applications in the past years. Wireless sensor technologies have emerged in almost every application eld imaginable. Smartphones equipped with Internet connectivity and home electronics with networking capability have made their way to everyday life. The Internet of Things (IoT) is a novel paradigm that has risen to frame the idea of a large scale sensing ecosystem, in which all possible devices could contribute. The denition of a thing in this context is very vague. It can be anything from passive RFID tags on retail packaging to intelligent transducers observing the surrounding world. The amount of connected devices in such a worldwide sensing network would be enormous. This is ultimately challenging for the current Internet architecture which is several decades old and is based on host-to-host connectivity. The current Internet addresses content by location. It is based on point-to-point connections, which eventually means that every connected device has to be uniquely addressable through a hostname or an IP address.
    [Show full text]
  • A Review on Reliability, Security and Memory Management of Numerous Operating Systems
    Indonesian Journal of Electrical Engineering and Informatics (IJEEI) Vol. 7, No. 3, Sep 2019, pp. 577~585 ISSN: 2089-3272, DOI: 10.11591/ijeei.v7i3.987 577 A Review on Reliability, Security and Memory Management of Numerous Operating Systems Mohammad Marufuzzaman1, Shafin Al Karim2, Md Saifur Rahman3, Noor Mohammad Zahid4, Lariyah Mohd Sidek5 1,5Sustainable Technology and Environment Group, Institute of Energy Infrastructure, Universiti Tenaga Nasional, 43000, Kajang, Selangor,Malaysia 2-4American International University, Dhaka, Bangladesh. Article Info ABSTRACT Article history: With the improvement of technology and the growing needs of computer systems, it is needed to ensure that operating systems are able to provide the Received Jan 25, 2019 required functionalities. To provide these functionality operating systems are Revised May 1, 2019 designed to maintain some design factors such as scalability, security, Accepted Jun 26, 2019 reliability, performance, memory management, energy efficiency. However, none of these factors can be achieved directly without facing any challenges. This research studied several design issues that are connected to each other in Keyword: terms of providing an effective result. Therefore, this review article tried to reveal the major issues, which are independently more complex to solve at IoT once. Finally, this research provides a guideline to overcome the challenges Scalabilitye for future researchers by studying many research articles based on these Energy efficiency design issues. Operating system Copyright © 2019 Institute of Advanced Engineering and Science. All rights reserved. Corresponding Author: Mohammad Marufuzzaman, Sustainable Technology and Environment Group, Institute of Energy Infrastructure, Universiti Tenaga Nasional, 43000, Kajang, Selangor,Malaysia Email: [email protected] 1.
    [Show full text]