We propose "DROPS", a scheme which dynamically selects radio protocols in an energy-constrained wearable IoT healthcare system. We consider the use of multiple radio protocols, which are capable of ...transmitting a patient's sensed physiological parameters to the server through Local Processing Units (LPUs). As the health parameters are non-stationary and temporally fluctuating, especially for critical patients, the selection of an appropriate radio protocol is essential to maintain the accuracy and timely delivery of data from the patient to the server. Additionally, the mobility of patients through various locations within the hospital mandates the selection of the best radio protocol among the multiple available ones for each location, to enable data to offload to the remote server. We use single-leader-multiple-follower Stackelberg non-cooperative game to map the strategic interactions between a patient's LPU and the hospital's server. "DROPS" dynamically selects the appropriate radio protocol, based on the criticality index of a patient, the reputation of the radio, the Euclidean distance between the radios and the LPU, and the load on the protocol. Results on real-life data and their large-scale emulation show that the data rate increases by almost 78% and throughput by approximately 7%, as compared to existing schemes.
The proliferation of IoT in various technological realms has resulted in the massive spurt of unsecured data. The use of complex security mechanisms for securing these data is highly restricted owing ...to the low-power and low-resource nature of most of the IoT devices, especially at the Edge. In this article, we propose to use blockchains for extending security to such IoT implementations. We deploy a Ethereum blockchain consisting of both regular and constrained devices connecting to the blockchain through wired and wireless heterogeneous networks. We additionally implement a secure and encrypted networked clock mechanism to synchronize the non-real-time IoT Edge nodes within the blockchain. Further, we experimentally study the feasibility of such a deployment and the bottlenecks associated with it by running necessary cryptographic operations for blockchains in IoT devices. We study the effects of network latency, increase in constrained blockchain nodes, data size, Ether, and blockchain node mobility during transaction and mining of data within our deployed blockchain. This study serves as a guideline for designing secured solutions for IoT implementations under various operating conditions such as those encountered for static IoT nodes and mobile IoT devices.
Industrial Internet of Things (IIoT) aims to achieve higher operational and management efficiencies by bridging machinery, equipment, human resources, and all other actors involved in an industrial ...environment. This bridging enables data flow over an often complex and heterogeneous communication network. It enables timely decision-making, which affects various aspects of the organization such as business, operations, maintenance, safety, stock, and logistics. Despite the plethora of works in the domain of IIoT dealing with the above aspects, very few works deal with safety in industries. Industrial safety, especially whenever it is intertwined with the safety of humans, is a critical domain and holds much scope for improvement in the context of IIoT-based solutions for industrial safety management. Through this survey, we provide a comprehensive overview of the safety issues prevalent in the industries. Subsequently, we classify and provide an in-depth analysis of the safety aspects in various application areas of IIoT such as healthcare, transportation, manufacturing, and mining. Finally, we examine the research gaps in various domains and recommend future research directions. We discuss diverse forms of technologies, prototypes, systems, models, methods, and applications to ensure the safety of individuals and the risks associated with them. The primary aim of this work is to analyze and synthesize the existing researches and acknowledge the applicability of these research works towards safety management using IIoT.
There are many well-known systematic approaches to design the digital systems used in manufacturing. However, there are only a few approaches that specifically deal with low-cost components. Such ...components may not provide the same level of completeness as more expensive industrial alternatives and may need to be combined with other components to become comparable. Consequently, common design challenges for systems comprising such low-cost components revolve around extendability and interface standardisation. There is a need for analysing the capability of the existing approaches to design these systems. This study aims to evaluate the effectiveness of designs for low-cost digital manufacturing systems that have been derived from a particular design approach. The proposed evaluation methodology is used for the special case of designs that are directly based on reference architectures and for the development of specific metrics for that purpose. To quantify the effectiveness, these metrics are applied to a number of design scenarios. Although focusing on reference-architecture-based designs, the proposed methodology can also be used for other design approaches. The evaluation and structured implementation comparison helps practitioners in selecting an effective design approach to low-cost digital manufacturing systems and provides insights into how a particular design approach can become more effective.
This paper looks into the problem of a decentralized data offloading within an edge unmanned aerial vehicle (UAV) swarm to mitigate the complexities of a single UAV continually generating and ...processing large application-specific data. The mobile edge UAVs considered here are multirotor types having constrained energy and processing power, which makes long-term handling of large data volumes impossible for standalone UAVs. The load mitigation is carried out by offloading data from a source UAV to other swarm members with sufficient energy and processing requirements. In this paper, we focus on selecting the most optimal multihop path through the UAVs concerning available energies and processing resources, which can survive the duration of the data offload between the source and a target UAV. We formulate a multiarmed bandit-based offload path selection scheme, which selects the most energy and processing optimized multihop path between a source and a target UAV. Upon comparison of our scheme against the naive shortest path approach, we observe that our approach results in significant savings of collective network energies, even for long operational durations.
We attribute the gain in popularity of Unmanned Aerial Vehicles (UAV), Platforms and Systems (UAS) to its ease of operation, versatility, and risk-free piloting. The primary UAV application domain ...has expanded from recreational and military flights to include scientific surveys and agriculture. The popularity of UAVs in scientific data gathering and applications, especially the use of small multi-rotor UAVs is quite widespread. These portable multi-rotor UAVs are portable, low-cost, highly maneuverable, and easy to handle. These features make such UAVs attractive to scientists and researchers worldwide. There has been a sudden spurt of UAV use in niche domains such as agriculture. Agriculturalists are choosing UAV-based field operations and remote sensing over the time-tested satellite-based ones, especially for local-scale and high spatiotemporal resolution imagery. In this survey, we explore various UAV application areas, types, sensors, research domains, and deployment architectures. We provide comparisons between various UAV types, sensing technologies (UAV, WSN, satellites), UAV architectures, and their utility in precision agriculture. Finally, we outline the challenges and the future scope of such UAV-based solutions for precision agriculture.
In this work, we propose SemBox - Semantic interoperability in a Box, to enable wireless on-the-go communication between heterogeneous wearable health monitoring devices. It can connect wirelessly to ...the health monitoring devices and receive their data packets. It uses a Mamdani-based fuzzy inference system with data pre-processing to classify the received data packet into one of the classes of the vital parameters. It enables semantic interoperability by labelling and annotating the data packets based on the extracted packet information. We implement SemBox using three different health monitoring wearables, with different keywords used for each vital parameter representation in the data packet. SemBox shows a maximum classification accuracy of 85.71%, with a maximum PDR of 1 at the SemBox with varying device parameters. Overall, SemBox is a potential plug-and-play solution to achieve semantic interoperability and collaboration between heterogeneous health monitoring wearable devices, irrespective of their commercial and proprietary specifications. It is customizable for applications that use multiple heterogeneous devices for collaborative monitoring and decision support. SemBox enables interoperability among health monitoring devices, introduces flexibility and ease the inter-device dynamics in the domain of biomedical research.
We propose the adaptation of vibration-based condition monitoring systems and techniques, popularly used in industrial condition-based maintenance, for identifying the possibility of compromising the ...privacy of personal computing systems. This work exploits the automated fan-based heat dissipation features and read/write operations of disk-based storage, commonly present in personal computers, to read computing task-specific vibration signatures on the computer's cabinet/case. These vibration signatures are then used to identify the broad classes of tasks being executed on a separate computer without ever needing to log into the monitored machine. This work builds upon the premise that heterogeneous tasks have distinct computing requirements, which translates to variations in the amount of heat generated by the computer's processor, eventually leading to variations in the computer's heat control fan speed. The variations in the fan's speed and the frequency of read/write operations to disk-based storage create unique vibration signatures, which maps uniquely to the computer's processing operations, leading to a breach of privacy of the computer. Our work's preliminary results suggest that computer-based tasks can be mapped from their vibration signatures with an accuracy of at least <inline-formula><tex-math notation="LaTeX">70\%</tex-math> <mml:math><mml:mrow><mml:mn>70</mml:mn><mml:mo>%</mml:mo></mml:mrow></mml:math><inline-graphic xlink:href="misra-ieq1-3139181.gif"/> </inline-formula>. We additionally study the task identification granularity of such an approach.
Timed Loops for Distributed Storage in Wireless Networks Mukherjee, Anandarup; Deb, Pallav Kumar; Misra, Sudip
IEEE transactions on parallel and distributed systems,
2022-March-1, 2022-3-1, Volume:
33, Issue:
3
Journal Article
Peer reviewed
IoT deployments that have limited memories lack sustained computation power and have limited connectivity to the Internet due to intermittent last-mile connectivity, particularly in rural and remote ...locations. For maintaining congestion-free operations, most of the collected data from these networks are discarded, instead of being transmitted remotely for further processing. In this article, we propose the paradigm Timed Loop Storage to distribute the data and use the underutilized bandwidth of local network links for sequentially queuing packets of computational data that are being operated on in parts in one of the IoT nodes. While the sequenced packets are executed sequentially on the target IoT device, the remaining packets, which are currently not being operated on, distribute and keep looping over the network links until they are required for processing. A time-synchronized packet deflection mechanism on each node handles data transfer and looping of individual packets. In our implementation, although we observe that the proposed approach requires data rates of 6 Mbps, it incurs only 45 Kb usage of primary storage systems even for sizeable data, ensuring scalability of the connected IoT devices' temporary storage capabilities, thereby making it useful for real-life applications.
Wireless sensor nodes have a wide span of applications ranging from industrial monitoring to military operations. These nodes are highly constrained in terms of battery life, processing capabilities, ...and in-built memory. Industrial wireless sensor networks (IWSNs) have to meet the constraints and peculiarities of industrial environments to ensure synchronization with parallel production processes. Applications of WSNs in industrial communication vary from condition monitoring and sensing to process automation. The 6LoWPAN standard enables efficient utilization of IPv6 protocol over low-power wireless personal area networks (LoWPANs). The use of 6LoWPANs for industrial communication necessitates the fulfillment of special QoS and security. We examine the aspect of secured information dissemination for industrial control and automation processes in this paper. Researchers have proposed several schemes to secure transfer of data over the Internet. Public key infrastructure (PKI) is one of the most popular security schemes being used in the present scenario. The hostile deployment scenarios of 6LoWPANs and resource constraints of the nodes necessitate the presence of a robust security mechanism to safeguard the communication. In this paper, we propose an integration scheme for PKI and 6LoWPAN to meet the enhanced security needs of industrial communication. The approach is to delegate a major portion of key management activity to the edge routers (gateway) of the LoWPAN and limit the involvement of the end nodes to minimal communication with the edge router. We do not propose a change in the current PKI, but we put forth a scheme to facilitate the integration of PKI to 6LoWPAN in an efficient manner. The effectiveness of the proposed algorithm was evaluated using a protocol analyzer for normal 6LoWPAN traffic as well as HUI HC-01 compressed traffic. A marginal increase of 2% in channel utilization was observed, which scaled down to 1% using HUI HC-01 compression. The results indicated that the proposed algorithm can be implemented for industrial control and automation networks without any speed, security, or performance tradeoffs.