Search results for " IoT"

showing 10 items of 26 documents

Bio-inspired security analysis for IoT scenarios

2020

Computer security has recently become more and more important as the world economy dependency from data has kept growing. The complexity of the systems that need to be kept secure calls for new models capable of abstracting the interdependencies among heterogeneous components that cooperate at providing the desired service. A promising approach is attack graph analysis, however, the manual analysis of attack graphs is tedious and error prone. In this paper we propose to apply the metabolic network model to attack graph analysis, using three interacting bio-inspired algorithms: topological analysis, flux balance analysis, and extreme pathway analysis. A developed framework for graph building…

Bio-inspired techniqueService (systems architecture)Security analysisIoTDependency (UML)Computer scienceNetwork securityDistributed computingmedia_common.quotation_subject0211 other engineering and technologies02 engineering and technologyMetabolic networksAttack graphs; Bio-inspired algorithms; Bio-inspired techniques; IoT; Metabolic networks; Network security; Security analysis; System securityAttack graph03 medical and health sciences0302 clinical medicineUse casemedia_common021110 strategic defence & security studiesSecurity analysisbusiness.industryMetabolic network030208 emergency & critical care medicineBio-inspired techniquesNetwork securitySystem securityFlux balance analysisInterdependenceHardware and ArchitectureBio-inspired algorithmGraph (abstract data type)businessSoftwareAttack graphsBio-inspired algorithms
researchProduct

Performance of LoRa for Bike-Sharing Systems

2019

Today bike sharing systems are becoming popular in many cities as short-distance transit vehicles. More than 18 million bicycles are available worldwide for public use and one of the main problems that afflicts such sharing systems is the loss of bikes, which can be stolen or simply left in unknown locations. Thus, many bikes are docked or tracked using GPS and costly cellular connections. In this paper, we consider the emerging Long Range (LoRa) technology for use in bike sharing systems. LoRa exploits free ISM bands and has been conceived for low power and low data rate applications. Additionally, LoRa is characterized by large cells and heterogeneous application domains, which may lead t…

ExploitSettore ING-INF/03 - Telecomunicazionibusiness.industryComputer science020209 energy020208 electrical & electronic engineeringAutomotive industry02 engineering and technologyScalabilityLow data rate0202 electrical engineering electronic engineering information engineeringGlobal Positioning SystemBike sharingbusinessInternet of ThingsLoRa LoRaWAN Low Power Wide Area Net-works (LPWAN) Automotive Vehicular Network (VANET) bikebike-sharing tracker IoTComputer network2019 AEIT International Conference of Electrical and Electronic Technologies for Automotive (AEIT AUTOMOTIVE)
researchProduct

DeCyMo: Decentralized Cyber-physical System for Monitoring and Controlling Industries and Homes

2018

The recent revolution of the Internet of Things has given the birth of a series of new technologies and cyber-physical systems to be used in industrial and home scenarios. Cyber- physical systems include physical and software components for providing smart monitoring and control with flexibility and adaptability to the operating context. The IoT paradigm enables the intertwined use of physical and software components through the interconnection of devices that exchange data with each other without direct human interaction in several fields, especially in industrial and home environments. We propose DeCyMo, a decentralized architecture that aims at solving common IoT issues and vulnerabiliti…

Flexibility (engineering)Emerging technologiesComputer scienceSettore ING-INF/03 - Telecomunicazionimedia_common.quotation_subjectCyber-physical systemContext (language use)Computer securitycomputer.software_genreExtensibilityAdaptabilityComponent-based software engineeringArchitecturecomputercyber-physical system blockchain IoT data streammedia_common
researchProduct

Blockchain for Smart Cities: Applications for IoT and Video Surveillance Systems

2020

The recent revolution of the Internet of Things introduces new engaging operat- ing scenarios. The IoT paradigm enables the intertwined use of physical and soft- ware components through the interconnection of devices that exchange data with each other without direct human interaction in several fields, especially in industrial and home environments. In the framework of the Italian-Vietnamese cooperation on the topics of smart cities and Blockchain, we present two applications of the blockchain technology, which can be applied, respectively in indoor, for monitoring and controlling smart homes, and in outdoor, for visual monitoring through video surveillance systems. In both cases, we propos…

Flexibility (engineering)ImmutabilityFocus (computing)BlockchainSettore ING-INF/03 - TelecomunicazioniComputer sciencebusiness.industryComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISIONVideosurveillance IoT blockchainComputer securitycomputer.software_genreExtensibilityComponent-based software engineeringTimestampInternet of Thingsbusinesscomputer
researchProduct

Stability of Positive Systems in WSN Gateway for IoT&IIoT

2020

Modern sensor networks work on the basis of intelligent sensors and actuators, their connection is carried out using conventional or specifically dedicated networks. The efficiency and smooth transmission of such a network is of great importance for the accuracy of measurements, sensor energy savings, or transmission speed. Ethernet in many networks is typically based on the TCP/IP protocol suite. Regardless of whether or not the network transmission is wired or wireless, it should always be reliable. TCP ensures transmission reliability through retransmissions, congestion control and flow control. But TPC is different in networks based on the UDP protocol. The most important here is the tr…

Flow control (data)0209 industrial biotechnologyAutomatic controlbusiness.industryComputer scienceMetzler matrixComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSNetwork system stability020206 networking & telecommunications02 engineering and technologyWireless sensor networkslaw.inventionNetwork congestion020901 industrial engineering & automationIntelligent sensorIndustrial IoTlawHeaderInternet Protocol0202 electrical engineering electronic engineering information engineeringUser Datagram ProtocolSoftware testing methodologybusinessWireless sensor networkComputer network
researchProduct

A Coexistence Study of Low-Power Wide-Area Networks based on LoRaWAN and Sigfox

2023

According to IoT Analytics, NB-IoT, LoRaWAN, and Sigfox are today the most popular technologies for low-power wide-area networks (86% of the market), both in terms of end-user adoption as well as ecosystem support. While NB-IoT utilizes licensed bands, LoRaWAN and Sigfox both employ the sub-GHz ISM bands, potentially interfering with each other.In this paper, we present a thorough coexistence study between LoRaWAN and Sigfox, in realistic urban scenarios, with different duty cycles and traffic conditions. The choice of such scenarios and simulation parameters are supported by an in-depth lit-erature review, and simulations are based on the SEAMCAT simulator. The results offer new insights o…

Interference SEAMCAT LPWAN IoT ISM LoRaWAN LoRa Sigfox Coexistence CSS UNB2023 IEEE Wireless Communications and Networking Conference (WCNC)
researchProduct

Legal Certainty as a Tool for the Spread of the Internet of Things

2015

- Internet of Things Law (issues and main regulations) - Actors - Contract Law - Nest use case - Product liability - Privacy and data protection

Internet Internet of Things IoT IT law product liability defective products nest contracts supply chain privacy data protectionSettore IUS/01 - Diritto Privato
researchProduct

Predicting lorawan behavior. How machine learning can help

2020

Large scale deployments of Internet of Things (IoT) networks are becoming reality. From a technology perspective, a lot of information related to device parameters, channel states, network and application data are stored in databases and can be used for an extensive analysis to improve the functionality of IoT systems in terms of network performance and user services. LoRaWAN (Long Range Wide Area Network) is one of the emerging IoT technologies, with a simple protocol based on LoRa modulation. In this work, we discuss how machine learning approaches can be used to improve network performance (and if and how they can help). To this aim, we describe a methodology to process LoRaWAN packets a…

IoTComputer Networks and CommunicationsComputer scienceDecision treeChannel occupancy; cluster analysis; IoT; LoRa; LoRaWAN; machine learning; network optimization; prediction analysisMachine learningcomputer.software_genreChannel occupancyLoRalcsh:QA75.5-76.95network optimizationNetwork performanceProtocol (object-oriented programming)Profiling (computer programming)Artificial neural networkNetwork packetbusiness.industrySettore ING-INF/03 - TelecomunicazioniPipeline (software)LoRaWANHuman-Computer Interactionmachine learningprediction analysisArtificial intelligencelcsh:Electronic computers. Computer sciencebusinesscomputerCommunication channelcluster analysis
researchProduct

A data aggregation strategy based on wavelet for the internet of things

2017

The advent of emerging information and communication technologies, such as RFID, small size sensors and sensor networks, has made accessible a huge amount of information that requires sophisticated and efficient search algorithms to support queries on that data. In this paper we focus on the problem of aggregating data collected from these devices to efficiently support queries, inferences or statistics on them. In general, data aggregation techniques are necessary to efficiently collect information in a compact and cost-effective way. Some current solutions try to meet the above criteria, by exploiting different data aggregation techniques, for instance BitVector or Q_Digest. In this manus…

IoTExploitRange query (data structures)Computer science0102 computer and information sciences02 engineering and technologyFog Computingcomputer.software_genre01 natural sciencesWaveletSoftwareSearch algorithmHistogramComputational Theory and Mathematic0202 electrical engineering electronic engineering information engineeringP2PSettore INF/01 - Informaticabusiness.industry020206 networking & telecommunicationsData aggregation; Fog Computing; IoT; P2P; Range query; WaveletData aggregationData aggregator010201 computation theory & mathematicsComputational MathematicRange queryData miningbusinesscomputerWireless sensor networkWaveletSoftware
researchProduct

Structure Monitoring with BIM and IoT: The Case Study of a Bridge Beam Model

2022

The diffusion of Building Information Modelling (BIM) as a reference methodology, applied to the world of construction, leads to important changes in the design and the management of big constructions and infrastructures. However, although the BIM approach is necessary for managing the entire life cycle of a construction, today, this methodology is still rarely adopted beyond the design phase. This represents a major flaw because the management of every phase of the life cycle of buildings needs accurate preliminary planning. Certainly, one of the most complex and important phases of the life cycle of a construction is the monitoring phase, which represents a fundamental aspect for the main…

IoTMonitoringSensorsGeography Planning and DevelopmentEarth and Planetary Sciences (miscellaneous)BIMRDBMS databaseComputers in Earth Sciences3D modellingDigital twinBIM; sensors; monitoring; RDBMS database; 3D modelling; construction; IoT; digital twinConstruction
researchProduct