Your browser doesn't support javascript.
loading
Show: 20 | 50 | 100
Resultados 1 - 15 de 15
Filtrar
1.
Sensors (Basel) ; 24(8)2024 Apr 10.
Artículo en Inglés | MEDLINE | ID: mdl-38676033

RESUMEN

Although wireless devices continuously gain communication capabilities, even state-of-the-art Industrial Internet of Things (IIoT) architectures, such as Internet Protocol version 6 over the Time-Slotted Channel Hopping (TSCH) mode of IEEE 802.15.4 (6TiSCH), continue to use network-wide, fixed link configurations. This presents a missed opportunity to (1) forego the need for rigorous manual setup of new deployments; and (2) provide full coverage of particularly heterogeneous and/or dynamic industrial sites. As such, we devised the Multi-Modal Minimal Scheduling Function (3MSF) for the TSCH link layer, which, combined with previous work on the routing layer, results in a 6TiSCH architecture able to dynamically exploit modern multi-modal hardware on a per-link basis through variable-duration timeslots, simultaneous transmission, and routing metric normalization. This paper describes, in great detail, its design and discusses the rationale behind every choice made. Finally, we evaluate three basic scenarios through simulations, showcasing both the functionality and flexibility of our 6TiSCH implementation.

2.
Sensors (Basel) ; 24(7)2024 Apr 06.
Artículo en Inglés | MEDLINE | ID: mdl-38610541

RESUMEN

RPL-Routing Protocol for Low-Power and Lossy Networks (usually pronounced "ripple")-is the de facto standard for IoT networks. However, it neglects to exploit IoT devices' full capacity to optimize their transmission power, mainly because it is quite challenging to do so in parallel with the routing strategy, given the dynamic nature of wireless links and the typically constrained resources of IoT devices. Adapting the transmission power requires dynamically assessing many parameters, such as the probability of packet collisions, energy consumption, the number of hops, and interference. This paper introduces Adaptive Control of Transmission Power for RPL (ACTOR) for the dynamic optimization of transmission power. ACTOR aims to improve throughput in dense networks by passively exploring different transmission power levels. The classic solutions of bandit theory, including the Upper Confidence Bound (UCB) and Discounted UCB, accelerate the convergence of the exploration and guarantee its optimality. ACTOR is also enhanced via mechanisms to blacklist undesirable transmission power levels and stabilize the topology of parent-child negotiations. The results of the experiments conducted on our 40-node, 12-node testbed demonstrate that ACTOR achieves a higher packet delivery ratio by almost 20%, reduces the transmission power of nodes by up to 10 dBm, and maintains a stable topology with significantly fewer parent switches compared to the standard RPL and the selected benchmarks. These findings are consistent with simulations conducted across 7 different scenarios, where improvements in end-to-end delay, packet delivery, and energy consumption were observed by up to 50%.

3.
Sensors (Basel) ; 23(11)2023 May 30.
Artículo en Inglés | MEDLINE | ID: mdl-37299919

RESUMEN

The distribution of wireless network systems challenges the communication security of Internet of Things (IoT), and the IPv6 protocol is gradually becoming the main communication protocol under the IoT. The Neighbor Discovery Protocol (NDP), as the base protocol of IPv6, includes address resolution, DAD, route redirection and other functions. The NDP protocol faces many attacks, such as DDoS attacks, MITM attacks, etc. In this paper, we focus on the communication-addressing problem between nodes in the Internet of Things (IoT). We propose a Petri-Net-based NS flooding attack model for the flooding attack problem of address resolution protocols under the NDP protocol. Through a fine-grained analysis of the Petri Net model and attacking techniques, we propose another Petri-Net-based defense model under the SDN architecture, achieving security for communications. We further simulate the normal communication between nodes in the EVE-NG simulation environment. We implement a DDoS attack on the communication protocol by an attacker who obtains the attack data through the THC-IPv6 tool. In this paper, the SVM algorithm, random forest algorithm (RF) and Bayesian algorithm (NBC) are used to process the attack data. The NBC algorithm is proven to exhibit high accuracy in classifying and identifying data through experiments. Further, the abnormal data are discarded through the abnormal data processing rules issued by the controller in the SDN architecture, to ensure the security of communications between nodes.


Asunto(s)
Internet de las Cosas , Algoritmos , Teorema de Bayes , Comunicación , Internet , Tecnología Inalámbrica , Seguridad Computacional
4.
Sensors (Basel) ; 22(4)2022 Feb 16.
Artículo en Inglés | MEDLINE | ID: mdl-35214429

RESUMEN

Low Power Wide Area Networks (LPWAN) are expected to enable the massive connectivity of small and constrained devices to the Internet of Things. Due to the restricted nature of both end devices and network links, LPWAN technologies employ network stacks where there is no interoperable network layer as a general case; instead, application data are usually placed directly into technology-specific two-layer frames. Besides not being able to run standard IP-based protocols at the end device, the lack of an IP layer also causes LPWAN segments to operate in an isolated manner, requiring middleboxes to interface non-IP LPWAN technologies with the IP world. The IETF has standardized a compression and fragmentation scheme, called Static Context Header Compression and Fragmentation (SCHC), which can compress and fragment IPv6 and UDP headers for LPWAN in a way that enables IP-based communications on the constrained end device. This article presents a model to determine the channel occupation efficiency based on the transmission times of SCHC messages in the upstream channel of a LoRaWAN™ link using the ACK-on-Error mode of standard SCHC. The model is compared against experimental data obtained from the transmission of packets that are fragmented using a SCHC over LoRaWAN implementation. This modeling provides a relationship between the channel occupancy efficiency, the spreading factor of LoRa™, and the probability of an error of a SCHC message. The results show that the model correctly predicts the efficiency in channel occupation for all spreading factors. Furthermore, the SCHC ACK-on-Error mode implementation for the upstream channel has been made fully available for further use by the research community.


Asunto(s)
Compresión de Datos , Comunicación , Fenómenos Físicos
5.
Sensors (Basel) ; 22(24)2022 Dec 14.
Artículo en Inglés | MEDLINE | ID: mdl-36560200

RESUMEN

The Internet of things is a popular concept in the current digital revolution. Nowadays, devices worldwide can be connected to the Internet, enhancing their communication, capabilities, and intelligence. Low-Power Wireless Personal Area Network (6LoWPAN) was specifically designed to build wireless networks for IoT resource-constrained devices. However, 6LoWPAN is susceptible to several security attacks. The fragmentation mechanism, in particular, is vulnerable to various attacks due to the lack of fragment authentication and verification procedures in the adaptation layer. This article provides a survey of fragmentation attacks and available countermeasures. Furthermore, the buffer reservation attack, one of the most harmful fragmentation attacks that may cause DoS, is studied and simulated in detail. A countermeasure for this attack is also implemented based on a reputation-scoring scheme. Experiments showed the harmful effects of the buffer reservation attack and the effectiveness of the implemented reputation-scoring countermeasure.


Asunto(s)
Internet de las Cosas , Simulación por Computador , Aclimatación , Comunicación , Internet
6.
Sensors (Basel) ; 22(17)2022 Aug 25.
Artículo en Inglés | MEDLINE | ID: mdl-36080858

RESUMEN

Wireless sensor networks (WSNs) are becoming increasingly prevalent in numerous fields. Industrial applications and natural-disaster-detection systems need fast and reliable data transmission, and in several cases, they need to be able to cope with changing traffic conditions. Thus, time-slotted channel hopping (TSCH) offers high reliability and efficient power management at the medium access control (MAC) level; TSCH considers two dimensions, time and frequency when allocating communication resources. However, the scheduler, which decides where in time and frequency these communication resources are allotted, is not part of the standard. Orchestra has been proposed as a scheduler which allocates the communication resources based on information collected through the IPv6 routing protocol for low-power and lossy networks (RPL). Orchestra is a very elegant solution, but does not adapt to high traffic. This research aims to build an Orchestra-based scheduler for applications with unpredictable traffic bursts. The implemented scheduler allocates resources based on traffic congestion measured for the children of the root and RPL subtree size of the same nodes. The performance analysis of the proposed scheduler shows lower latency and higher packet delivery ratio (PDR) compared to Orchestra during bursts, with negligible impact outside them.


Asunto(s)
Redes de Comunicación de Computadores , Tecnología Inalámbrica , Algoritmos , Niño , Humanos , Reproducibilidad de los Resultados
7.
Sensors (Basel) ; 22(9)2022 Apr 29.
Artículo en Inglés | MEDLINE | ID: mdl-35591090

RESUMEN

The IETF Routing Over Low power and Lossy network (ROLL) working group defined IPv6 Routing Protocol for Low Power and Lossy Network (RPL) to facilitate efficient routing in IPv6 over Low-Power Wireless Personal Area Networks (6LoWPAN). Limited resources of 6LoWPAN nodes make it challenging to secure the environment, leaving it vulnerable to threats and security attacks. Machine Learning (ML) and Deep Learning (DL) approaches have shown promise as effective and efficient mechanisms for detecting anomalous behaviors in RPL-based 6LoWPAN. Therefore, this paper systematically reviews and critically analyzes the research landscape on ML, DL, and combined ML-DL approaches applied to detect attacks in RPL networks. In addition, this study examined existing datasets designed explicitly for the RPL network. This work collects relevant studies from five major databases: Google Scholar, Springer Link, Scopus, Science Direct, and IEEE Xplore® digital library. Furthermore, 15,543 studies, retrieved from January 2016 to mid-2021, were refined according to the assigned inclusion criteria and designed research questions resulting in 49 studies. Finally, a conclusive discussion highlights the issues and challenges in the existing studies and proposes several future research directions.


Asunto(s)
Aprendizaje Profundo , Internet de las Cosas , Publicaciones
8.
Sensors (Basel) ; 22(1)2021 Dec 26.
Artículo en Inglés | MEDLINE | ID: mdl-35009686

RESUMEN

Internet and telecom service providers worldwide are facing financial sustainability issues in migrating their existing legacy IPv4 networking system due to backward compatibility issues with the latest generation networking paradigms viz. Internet protocol version 6 (IPv6) and software-defined networking (SDN). Bench marking of existing networking devices is required to identify their status whether the existing running devices are upgradable or need replacement to make them operable with SDN and IPv6 networking so that internet and telecom service providers can properly plan their network migration to optimize capital and operational expenditures for future sustainability. In this paper, we implement "adaptive neuro fuzzy inference system (ANFIS)", a well-known intelligent approach for network device status identification to classify whether a network device is upgradable or requires replacement. Similarly, we establish a knowledge base (KB) system to store the information of device internetwork operating system (IoS)/firmware version, its SDN, and IPv6 support with end-of-life and end-of-support. For input to ANFIS, device performance metrics such as average CPU utilization, throughput, and memory capacity are retrieved and mapped with data from KB. We run the experiment with other well-known classification methods, for example, support vector machine (SVM), fine tree, and liner regression to compare performance results with ANFIS. The comparative results show that the ANFIS-based classification approach is more accurate and optimal than other methods. For service providers with a large number of network devices, this approach assists them to properly classify the device and make a decision for the smooth transitioning to SDN-enabled IPv6 networks.


Asunto(s)
Algoritmos , Redes de Comunicación de Computadores , Internet , Programas Informáticos
9.
Sensors (Basel) ; 21(5)2021 Mar 04.
Artículo en Inglés | MEDLINE | ID: mdl-33806411

RESUMEN

Smart buildings benefit from IEEE 802.15.4e time slotted channel hopping (TSCH) medium access for creating reliable and power aware wireless sensor and actuator networks (WSANs). As in these networks, sensors are supposed to communicate to each other and with actuators, IPv6 multicast forwarding is seen as a valuable means to reduce traffic. A promising approach to multicast, based on the Routing Protocol for Low Power and Lossy Networks (RPL) is Bidirectional Multicast RPL Forwarding (BMRF). This paper aimed to analyze the performance of BMRF over TSCH. The authors investigated how an adequate TSCH scheduler can help to achieve a requested quality of service (QoS). A theoretical model for the delay and energy consumption of BMRF over TSCH is presented. Next, BMRF's link layer (LL) unicast and LL broadcast forwarding modes were analyzed on restricted and realistic topologies. On topologies with increased interference, BMRF's LL broadcast on top of TSCH causes high energy consumption, mainly because of the amount of energy needed to run the schedule, but it significantly improves packet delivery ratio and delay compared to ContikiMAC under the same conditions. In most cases, the LL unicast was found to outperform the LL broadcast, but the latter can be beneficial to certain applications, especially those sensitive to delays.

10.
Sensors (Basel) ; 20(9)2020 May 09.
Artículo en Inglés | MEDLINE | ID: mdl-32397469

RESUMEN

IPv6 over Low Power Wireless Personal Area Networks (6LoWPAN) has an ample share in the Internet of Things. Sensor nodes in 6LoWPAN collect vital information from the environment and transmit to a central server through the public Internet. Therefore, it is inevitable to secure communications and allow legitimate sensor nodes to access network resources. This paper presents a lightweight Authentication and Key Exchange (AKE) scheme for 6LoWPAN using an authenticated encryption algorithm and hash function. Upon successful authentication, sensor nodes and the central server can establish the secret key for secure communications. The proposed scheme ensures header verification during the AKE process without using IP security protocol and, thus, has low communication and computational overheads. The logical correctness of the proposed scheme is validated through Burrows-Abadi-Needham logic. Furthermore, automatic security analyses by using AVISPA illustrate that the proposed scheme is resistant to various malicious attacks in 6LoWPANs.

11.
Sensors (Basel) ; 15(9): 21478-99, 2015 Aug 28.
Artículo en Inglés | MEDLINE | ID: mdl-26343677

RESUMEN

The Internet of Things is integrating information systems, places, users and billions of constrained devices into one global network. This network requires secure and private means of communications. The building blocks of the Internet of Things are devices manufactured by various producers and are designed to fulfil different needs. There would be no common hardware platform that could be applied in every scenario. In such a heterogeneous environment, there is a strong need for the optimization of interoperable security. We present optimized elliptic curve Cryptography algorithms that address the security issues in the heterogeneous IoT networks. We have combined cryptographic algorithms for the NXP/Jennic 5148- and MSP430-based IoT devices and used them to created novel key negotiation protocol.

12.
Wirel Pers Commun ; 123(4): 3661-3697, 2022.
Artículo en Inglés | MEDLINE | ID: mdl-34812221

RESUMEN

Internet connects people to people, people to machine, and machine to machine for a life of serendipity through a Cloud. Internet of Things networks objects or people and integrates them with software to collect and exchange data. The Internet of things (IoT) influences our lives based on how we ruminate, respond, and anticipate. IoT 2021 heralds from the fringes to the data ecosystem and panaches a comfort zone. IoT is overwhelmingly embraced by businessmen and consumers due to increased productivity and convenience. Internet of Things facilitates intelligent device control with cloud vendors like Amazon and Google using artificial intelligence for data analytics, and with digital assistants like Alexa and Siri providing a voice user interface. Smart IoT is all about duplex connecting, processing, and implementing. Centralized IoT architecture is vulnerable to cyber-attacks. With Block Chain, it is possible to maintain transparency and security of the transaction's data. Robotic Process Automation (RPA) using bots has automated laborious tasks in 2019. Embedded Internet using Facial Recognition could reduce the coronavirus pandemic crisis by making a paradigm shift from fingerprint sensors to facial recognition. Security concerns are addressed with micro-segmentation approaches. IoT, an incredible vision of the future makes systems adaptive with customized features, responsive with increased efficiency, and procurable with optimized cost. This research delivers a comprehensive insight into the technical perspectives of IoT, focusing on interoperability, flexibility, scalability, mobility, security, transparency, standardization, and low energy. A smart classroom is implemented based on the concepts of IoT.

13.
Technol Health Care ; 30(2): 505-508, 2022.
Artículo en Inglés | MEDLINE | ID: mdl-34957972

RESUMEN

BACKGROUND: Originally, digital healthcare was created to support underserved and rural patients gain access to health services. Phones, devices, and computers need IP (Internet Protocol) addresses to connect to the Internet. OBJECTIVE: This paper aims to study the close relationship between the Internet and the transformation of healthcare services. METHODS: The current protocol in use is the Internet Protocol version 4 (IPv4), whose number of Internet addresses has been globally exhausted. The Internet Protocol version 6 (IPv6) with 47 octillion unique addresses for every person on the planet has become the only option for sustainable growth and innovation. However, most of the worldwide industry is still in IPv4. In the era of Artificial Intelligence, Internet of Things, Fifth Generation of Cellular Technology (5G), and Blockchain, there will be a massive need of IP addresses. For 2025, experts predict over 1.5 billion new IPv6 users which will continue to grow exponentially. RESULTS: Nations need to tackle the increasing industry requirements for IPv6 and telehealth adoption to benefit from the full IPv6 connectivity which is the key strategic advantage for the healthcare industry. CONCLUSION: The strategic potential that telehealth brings to the healthcare industry is widely appreciated. However, what are the implications of its expansion around the world? How can we prioritize the poorest and most vulnerable in society without new technologies?


Asunto(s)
Inteligencia Artificial , Telemedicina , Atención a la Salud , Humanos , Internet , Telemedicina/métodos
14.
Artículo en Zh | WPRIM | ID: wpr-560235

RESUMEN

This paper reviews the problem and shortage of IPv4 network which was unfolded during its use in telemedicine field and describes the features and advantage of IPv6, which is the next generation protocol of Internet by comparing it to IPv4. The application of IPv6 in telemedicine field is prospected. The work should be done and the problem may be met during the change from IPv4 to IPv6 network are also discussed.

15.
Artículo en Zh | WPRIM | ID: wpr-585023

RESUMEN

This paper introduces a solution to the development of next-generation telemedicine system based on Ipv6 with the analyses of present situation and related problems of telemedicine system.The devices,advantage of new system and a successful program based on Ipv6 are also mentioned.

SELECCIÓN DE REFERENCIAS
Detalles de la búsqueda