New verticals within the Internet of Things (IoT) paradigm such as smart cities, smart farming, or goods monitoring, among many others, are demanding strong requirements to the Radio Access Network ...(RAN) in terms of coverage, end-node's power consumption, and scalability. The technologies employed so far to provide IoT scenarios with connectivity, e.g., wireless sensor network and cellular technologies, are not able to simultaneously cope with these three requirements. Thus, a novel solution known as Low Power - Wide Area Network (LP-WAN) has emerged as a promising alternative to provide with low-cost and low-power-consumption connectivity to end-nodes spread in a wide area. Concretely, the Long-Range Wide Area Network (LoRaWAN) technology is one of the LP-WAN platforms that is receiving greater attention from both the industry and the academia. For that reason, in this work, a comprehensive performance evaluation of LoRaWAN under different environmental conditions is presented. The results are obtained from three real scenarios, namely, urban, suburban, and rural, considering both dynamic and static conditions, hence a discussion about the most proper LoRaWAN physical-layer configuration for each scenario is provided. Besides, a theoretical coverage study is also conducted by the use of a radio planning tool considering topographic maps and a precise propagation model. From the attained results, it can be concluded that it is necessary to evaluate the propagation conditions of the deployment scenario prior to the system implantation in order to reach a compromise between the robustness of the network and the transmission data-rate.
Diabetes therapy management in AAL environments, such as old people and diabetes patients homes, is a very difficult task since many factors affect a patient’s blood sugar levels. Factors such as ...illness, treatments, physical and psychological stress, physical activity, drugs, intravenous fluids and change in the meal plan cause unpredictable and potentially dangerous fluctuations in blood sugar levels. Right now, operations related to dosage are based on insulin infusion protocol boards, which are provided by physicians to the patients. These boards are not considering very influential factors such as glycemic index from the diet, consequently patients need to estimate the dosage leading to dose error, which culminates in hyperglycemia and hypoglycemia episode. Therefore, right insulin infusion calculation needs to be supported by the next generation of personal-care devices. For this reason, a personal device has been developed to assist and consider more factors in the insulin therapy dosage calculation. The proposed solution is based on Internet of things in order to, on the one hand, support a patient’s profile management architecture based on personal RFID cards and, on the other hand, provide global connectivity between the developed patient’s personal device based on 6LoWPAN, nurses/physicians desktop application to manage personal health cards, glycemic index information system, and patient’s web portal. This solution has been evaluated by a multidisciplinary group formed by patients, physicians, and nurses.
The continuous evolution of the agricultural sector justifies the incorporation and adaptation of the latest technologies. Nowadays, managing crops is possible through Internet-based technologies. ...Their application allows for the exploitation of information and the development of isolated applications, which, although powerful, create challenges for obtaining scalable predictions throughout the useful life of farms. To address this problem, a data model was defined to improve the management of crop plots in irrigation communities and simultaneously monitor crop needs. Consequently, the objective of this study was to create an open and interoperable platform based on standard interfaces and protocols to enable the integration of heterogeneous sources of information, while ensuring interoperability with other third-party solutions for exchanging and exploiting such information. Standard and open interfaces and protocols form the basis of the platform, thereby unifying all information in a single data model, which facilitates the better use and dissemination of information. The system was fully instantiated in a real prototype in an irrigation community; the software improved water irrigation management for the farmers connected to the platform.
The massive collection of data via emerging technologies like the Internet of Things (IoT) requires finding optimal ways to reduce the created features that have a potential impact on the information ...that can be extracted through the machine learning process. The mining of knowledge related to a concept is done on the basis of the features of data. The process of finding the best combination of features is called feature selection. In this paper we deal with multivariate time-dependent series of data points for energy forecasting in smart buildings. We propose a methodology to transform the time-dependent database into a structure that standard machine learning algorithms can process, and then, apply different types of feature selection methods for regression tasks. We used Weka for the tasks of database transformation, feature selection, regression, statistical test and forecasting. The proposed methodology improves MAE by 59.97% and RMSE by 40.75%, evaluated on training data, and it improves MAE by 42.28% and RMSE by 36.62%, evaluated on test data, on average for 1-step-ahead, 2-step-ahead and 3-step-ahead when compared to not applying any feature selection methodology.
The Internet of Things (IoT) represents the current technology revolution that is intended to transform the current environment into a more pervasive and ubiquitous world. In this emerging ecosystem, ...the application of standard security technologies has to cope with the inherent nature of constrained physical devices, which are seamlessly integrated into the Internet infrastructure. This work proposes a set of lightweight authentication and authorization mechanisms in order to support smart objects during their life cycle. Furthermore, such mechanisms are framed within a proposed security framework, which is compliant with the Architectural Reference Model, recently presented by the EU FP7 IoT-A project. The resulting architecture is intended to provide a holistic security approach to be leveraged in the design of novel and lightweight security protocols for IoT constrained environments.
This paper presents a review of technologies under the paradigm 4.0 applied to the study of the thermal comfort and, implicitly, energy efficiency. The research is based on the analysis of the ...Internet of Things (IoT) literature, presenting a comparison among several approaches adopted. The central objective of the research is to outline the path that has been taken throughout the last decade towards a people-centric approach, discussing how users switched from being passive receivers of IoT services to being an active part of it. Basing on existing studies, authors performed what was a necessary and unprecedented grouping of the IoT applications to the thermal comfort into three categories: the thermal comfort studies with IoT hardware, in which the approach focuses on physical devices, the mimicking of IoT sensors and comfort using Building Simulation Models, based on the dynamic modelling of the thermal comfort through IoT systems, and Crowdsensing, a new concept in which people can express their sensation proactively using IoT devices. Analysing the trends of the three categories, the results showed that Crowdsensing has a promising future in the investigation through the IoT, although some technical steps forward are needed to achieve a satisfactory application to the thermal comfort matter.
The dawn of the Internet of Things (IoT) paradigm has brought about a series of novel services never imagined until recently. However, certain deployments such as those employing Low-Power Wide-Area ...Network (LPWAN)-based technologies may present severe network restrictions in terms of throughput and supported packet length. This situation prompts the isolation of LPWAN systems on islands with limited interoperability with the Internet. For that reason, the IETF's
working group has proposed a Static Context Header Compression (SCHC) scheme that permits compression and fragmentation of and IPv6/UDP/CoAP packets with the aim of making them suitable for transmission over the restricted links of LPWANs. Given the impact that such a solution can have in many IoT scenarios, this paper addresses its real evaluation in terms not only of latency and delivery ratio improvements, as a consequence of different compression and fragmentation levels, but also of the overhead in end node resources and useful payload sent per fragment. This has been carried out with the implementation of middleware and using a real testbed implementation of a LoRaWAN-to-IPv6 architecture together with a publish/subscribe broker for CoAP. The attained results show the advantages of SCHC, and sustain discussion regarding the impact of different SCHC and LoRaWAN configurations on the performance. It is highlighted that necessary end node resources are low as compared to the benefit of delivering long IPv6 packets over the LPWAN links. In turn, fragmentation can impose a lack of efficiency in terms of data and energy and, hence, a cross-layer solution is needed in order to obtain the best throughput of the network.
Communication and information access defines the basis to reach a personalized health end-to-end framework. Personalized health capability is limited to the available data from the patient. The data ...is usually dynamic and incomplete. Therefore, it presents a critical issue for mining, analysis and trending. For that reason, this work presents an interconnection framework for mobile Health (mHealth) based on the Internet of Things. It makes continuous and remote vital sign monitoring feasible and introduces technological innovations for empowering health monitors and patient devices with Internet capabilities. It also allows patient monitoring and supervision by remote centers, and personal platforms such as tablets. In terms of hardware it offers a gateway and a personal clinical device used for the wireless transmission of continuous vital signs through 6LoWPAN, and patient identification through RFID. In terms of software, this interconnection framework presents a novel protocol, called YOAPY, for an efficient, secure, and scalable integration of the sensors deployed in the patient's personal environment. This paper presents the architecture and evaluates its capability to provide continuous monitoring, ubiquitous connectivity, extended device integration, reliability, and security and privacy support. The proposed interconnection framework and the proposed protocol for the sensors have been exhaustively evaluated in the framework of the AIRE project, which is focused on patients with breathing problem. This evaluates for the proposed protocol the data aggregation mechanism level, Round-Trip delay Time, impact of the distance, and the impact of the security. It has been concluded that secure continuous monitoring is feasible with the use of the proposed {YOAPY}} aggregation mechanisms and the capabilities from the proposed interconnection framework.
Internet of Things environments are comprised of heterogeneous devices that are continuously exchanging information and being accessed ubiquitously through lossy networks. This drives the need of a ...flexible, lightweight and adaptive access control mechanism to cope with the pervasive nature of such global ecosystem, ensuring, at the same time, reliable communications between trusted devices. To fill this gap, this paper proposes a flexible trust-aware access control system for IoT (TACIoT), which provides an end-to-end and reliable security mechanism for IoT devices, based on a lightweight authorization mechanism and a novel trust modelthat has been specially devised for IoT environments. TACIoT extends traditional access control systems by taking into account trust values which are based on reputation, quality of service, security considerations and devices’ social relationships. TACIoT has been implemented and evaluated successfully in a real testbed for constrained and non-constrained IoT devices.
Security is critical in the deployment and maintenance of novel IoT and 5G networks. The process of bootstrapping is required to establish a secure data exchange between IoT devices and data-driven ...platforms. It entails, among other steps, authentication, authorization, and credential management. Nevertheless, there are few efforts dedicated to providing service access authentication in the area of constrained IoT devices connected to recent wireless networks such as narrowband IoT (NB-IoT) and 5G. Therefore, this paper presents the adaptation of bootstrapping protocols to be compliant with the 3GPP specifications in order to enable the 5G feature of secondary authentication for constrained IoT devices. To allow the secondary authentication and key establishment in NB-IoT and 4G/5G environments, we have adapted two Extensible Authentication Protocol (EAP) lower layers, i.e., PANATIKI and LO-CoAP-EAP. In fact, this approach presents the evaluation of both aforementioned EAP lower layers, showing the contrast between a current EAP lower layer standard, i.e., PANA, and one specifically designed with the constraints of IoT, thus providing high flexibility and scalability in the bootstrapping process in 5G networks. The proposed solution is evaluated to prove its efficiency and feasibility, being one of the first efforts to support secure service authentication and key establishment for constrained IoT devices in 5G environments.