• Title/Summary/Keyword: IoT (internet of things)

Search Result 1,916, Processing Time 0.029 seconds

Development of LoRa IoT Automatic Meter Reading and Meter Data Management System for Smart Water Grid (스마트워터그리드를 위한 LoRa IoT 원격검침 및 계량데이터 시스템 개발)

  • Park, Jeong-won;Park, Jae-sam
    • Journal of Advanced Navigation Technology
    • /
    • v.26 no.3
    • /
    • pp.172-178
    • /
    • 2022
  • In this paper, water meter AMR(automatic meter reading), one of the core technologies of smart water grid, using LoRa IoT network is studied. The main content of the research is to develop the network system and show the test results that one PC server receives the readings of water meters from multiple households through LoRa communication and stores them in the database, and at the same time sends the data to the web server database through internet. The system also allows users to monitor the meter readings using their smartphones. The hardware and firmware of the main board of the digital water meter are developed. For a PC server program, MDMS(meter data management system) is developed using Visual C#. The app program running on the user's smartphone is also developed using Android Studio. By connecting each developed parts, the total network system is mounted on a flow test bench in the laboratory and tested. For the fields test, 5 places around the university are selected and the transmission distances are tested. The test result show that the developed system can be applied into the real field. The developed system can be expanded to various social safety nets such as monitoring the living alone or elderly with dementia.

Development of Prediction Model for Yard Tractor Working Time in Container Terminal (컨테이너 터미널 야드 트랙터 작업시간 예측 모형 개발)

  • Jae-Young Shin;Do-Eun Lee;Yeong-Il Kim
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2023.05a
    • /
    • pp.57-58
    • /
    • 2023
  • The working time for loading and transporting containers in the container terminal is one of the factors directly related to port productivity, and minimizing working time for these operations can maximize port productivity. Among working time for container operations, the working time of yard tractors(Y/T) responsible for the transportation of containers between berth and yard is a significant portion. However, it is difficult to estimate the working time of yard tractors quantitatively, although it is possible to estimate it based on the practical experience of terminal operators. Recently, a technology based on IoT(Internet of Things), one of the core technologies of the 4th industrial revolution, is being studied to monitoring and tracking logistics resources within the port in real-time and calculate working time, but it is challenging to commercialize this technology at the actual port site. Therefore, this study aims to develop yard tractor working time prediction model to enhance the operational efficiency of the container terminal. To develop the prediction model, we analyze actual port operation data to identify factors that affect the yard tractor's works and predict its working time accordingly.

  • PDF

Survivability Analysis of MANET Routing Protocols under DOS Attacks

  • Abbas, Sohail;Haqdad, Muhammad;Khan, Muhammad Zahid;Rehman, Haseeb Ur;Khan, Ajab;Khan, Atta ur Rehman
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.9
    • /
    • pp.3639-3662
    • /
    • 2020
  • The network capability to accomplish its functions in a timely fashion under failures and attacks is known as survivability. Ad hoc routing protocols have been studied and extended to various domains, such as Intelligent Transport Systems (ITSs), Unmanned Aerial Vehicles (UAVs), underwater acoustic networks, and Internet of Things (IoT) focusing on different aspects, such as security, QoS, energy. The existing solutions proposed in this domain incur substantial overhead and eventually become burden on the network, especially when there are fewer attacks or no attack at all. There is a need that the effectiveness of these routing protocols be analyzed in the presence of Denial of Service (DoS) attacks without any intrusion detection or prevention system. This will enable us to establish and identify the inherently stable routing protocols that are capable to survive longer in the presence of these attacks. This work presents a DoS attack case study to perform theoretical analysis of survivability on node and network level in the presence of DoS attacks. We evaluate the performance of reactive and proactive routing protocols and analyse their survivability. For experimentation, we use NS-2 simulator without detection or prevention capabilities. Results show that proactive protocols perform better in terms of throughput, overhead and packet drop.

Pseudo-BIPV Style Rooftop-Solar-Plant Implementation for Small Warehouse Case

  • Cha, Jaesang;Cho, Ju Phil
    • International journal of advanced smart convergence
    • /
    • v.11 no.3
    • /
    • pp.187-196
    • /
    • 2022
  • In this paper, we propose an example of designing and constructing a roof-type solar power plant structure equipped with a Pseudo-BIPV (Building-Integrated Photovoltaic) shape suitable for use as a roof of a small warehouse with a sandwich-type panel structure. As the characteristics of the roof-type solar power generation facility to be installed in the small warehouse proposed in this study, the shape of the roof is not a general A type, but a right-angled triangle shape with the slope is designed to face south. We chose a structure in which an inverter for one power plant and a control facility are linked by grouping several roofs of buildings. In addition, the height of the roof structure is less than 20 cm from the floor, and it has a shape similar to that of the BIPV, so it is building-friendly because it is almost in close contact with the roof. At the same time, the roof creates a reflective light source due to the white color. By linking this roof with a double-sided solar panel, we designed it to obtain both the advantage of the roof-friendliness and the advantage of efficiency improvement for the electric power generation based on the double-sided panel. Compared to the existing solar power generation facilities using A-shaped cross-sectional modules, the power generation efficiency of roofs in this case is increased by more than 11%, which we can confirm, through the comparison analysis of monitoring data between power plants in the same area. Therefore, if the roof-type solar structure suitable for the small warehouse we have presented in this paper is used, the facilities of electric power generation is eco-friendly. Further it is easier to obtain facility certification compared to the BIPV, and improved capacity of the power generation can be secured at low material cost. It is believed that the roof-type solar power generation facility we proposed can be usefully used for warehouse or factory-based smart housing. Sensor devices for monitoring, CCTV monitoring, or safety and environment management, operating in connection with the solar power generation facilities, are linked with the Internet of Things (IoT) solution, so they can be monitored and controlled remotely.

An Intelligent MAC Protocol Selection Method based on Machine Learning in Wireless Sensor Networks

  • Qiao, Mu;Zhao, Haitao;Huang, Shengchun;Zhou, Li;Wang, Shan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.11
    • /
    • pp.5425-5448
    • /
    • 2018
  • Wireless sensor network has been widely used in Internet of Things (IoT) applications to support large and dense networks. As sensor nodes are usually tiny and provided with limited hardware resources, the existing multiple access methods, which involve high computational complexity to preserve the protocol performance, is not available under such a scenario. In this paper, we propose an intelligent Medium Access Control (MAC) protocol selection scheme based on machine learning in wireless sensor networks. We jointly consider the impact of inherent behavior and external environments to deal with the application limitation problem of the single type MAC protocol. This scheme can benefit from the combination of the competitive protocols and non-competitive protocols, and help the network nodes to select the MAC protocol that best suits the current network condition. Extensive simulation results validate our work, and it also proven that the accuracy of the proposed MAC protocol selection strategy is higher than the existing work.

Machine-to-Machine Communications: Architectures, Standards and Applications

  • Chen, Min;Wan, Jiafu;Li, Fang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.2
    • /
    • pp.480-497
    • /
    • 2012
  • As a new business concept, machine-to-machine (M2M) communications are born from original telemetry technology with the intrinsic features of automatic data transmissions and measurement from remote sources typically by cable or radio. M2M includes a number of technologies that need to be combined in a compatible manner to enable its deployment over a broad market of consumer electronics. In order to provide better understanding for this emerging concept, the correlations among M2M, wireless sensor networks, cyber-physical systems (CPS), and internet of things are first analyzed in this paper. Then, the basic M2M architecture is introduced and the key elements of the architecture are presented. Furthermore, the progress of global M2M standardization is reviewed, and some representative applications (i.e., smart home, smart grid and health care) are given to show that the M2M technologies are gradually utilized to benefit people's life. Finally, a novel M2M system integrating intelligent road with unmanned vehicle is proposed in the form of CPS, and an example of cyber-transportation systems for improving road safety and efficiency are introduced.

A Percolation based M2M Networking Architecture for Data Transmission and Routing

  • Lu, Jihua;An, Jianping;Li, Xiangming;Yang, Jie;Yang, Lei
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.2
    • /
    • pp.649-663
    • /
    • 2012
  • We propose a percolation based M2M networking architecture and its data transmission method. The proposed network architecture can be server-free and router-free, which allows us to operate routing efficiently with percolations based on six degrees of separation theory in small world network modeling. The data transmission can be divided into two phases: routing and data transmission phases. In the routing phase, probe packets will be transmitted and forwarded in the network thus multiple paths are selected and performed based on the constriction of the maximum hop number. In the second phase, the information will be encoded, say, with the fountain codes, and transmitted using the paths generated in the first phase. In such a way, an efficient routing and data transmission mechanism can be built, which allow us to construct a low-cost, flexible and ubiquitous network. Such a networking architecture and data transmission can be used in many M2M communications, such as the stub network of internet of things, and deep space networking, and so on.

A Reconfiguration Method for Preserving Network Bandwidth and Nodes Energy of Wireless Sensor Networks

  • Jung, Hyunjun;Jeong, Dongwon;On, Byung-Won;Baik, Doo-Kwon
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.5
    • /
    • pp.2181-2202
    • /
    • 2016
  • In Wireless Sensor Networks (WSNs) and even in the Internet of Things (IoT) ecosystem, the reconfiguration of sensor variables is an important problem when the role of a system (or application) program's sensor nodes needs to be adjusted in a particular situation. For example, the outdoor temperature in a volcanic zone, which is usually updated in a system every 10 s, should be updated every 1 s during an emergency situation. To solve this problem, this paper proposes a novel approach based on changing only a set of sensor variables in a part of a program, rather than modifying the entire program, in order to reduce both network congestion and the sensor nodes' battery consumption. To validate our approach, we demonstrate an implementation of a proof-of-concept prototype system and also present results of comparative studies showing the performance and effectiveness of our proposed method.

Firing Offset Adjustment of Bio-Inspired DESYNC-TDMA to Improve Slot Utilization Performances in Wireless Sensor Networks

  • Kim, Kwangsoo;Shin, Seung-hun;Roh, Byeong-hee
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.3
    • /
    • pp.1492-1509
    • /
    • 2017
  • The wireless sensor network (WSN) is a key technology to support the Internet of things (IoT) paradigm. The efficiency of the MAC protocol in WSN is very important to take scalability with restricted wireless resources. The DESYNC-TDMA has an advantage of simple distributed slot allocation inspired by nature, but there is a critical disadvantage of split slots by firing message. The basic split slot model has less efficiency for continuous packet transmitting because of wasting of the slots less than the packet size. In this paper, we propose a firing offset adjustment scheme to improve the efficiency of slot utilizations, which can manage the slot assigned to each node as a single large block, called the single slot model. The performance analysis models for both the existing and the proposed schemes are also derived. Experimental results show that the proposed method provide better efficiency of slot utilization than the existing schemes without any loss of the nature of the desynchronization.

An ID-based Broadcast Encryption Scheme for Cloud-network Integration in Smart Grid

  • Niu, Shufen;Fang, Lizhi;Song, Mi;Yu, Fei;Han, Song
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.9
    • /
    • pp.3365-3383
    • /
    • 2021
  • The rapid growth of data has successfully promoted the development of modern information and communication technologies, which are used to process data generated by public urban departments and citizens in modern cities. In specific application areas where the ciphertext of messages generated by different users' needs to be transmitted, the concept of broadcast encryption is important. It can not only improve the transmission efficiency but also reduce the cost. However, the existing schemes cannot entirely ensure the privacy of receivers and dynamically adjust the user authorization. To mitigate these deficiencies, we propose an efficient, secure identity-based broadcast encryption scheme that achieves direct revocation and receiver anonymity, along with the analysis of smart grid solutions. Moreover, we constructed a security model to ensure wireless data transmission under cloud computing and internet of things integrated devices. The achieved results reveal that the proposed scheme is semantically secure in the random oracle model. The performance of the proposed scheme is evaluated through theoretical analysis and numerical experiments.