Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Series

IoT

Discipline
Institution
Publication Year
Publication

Articles 1 - 30 of 53

Full-Text Articles in Engineering

Using Feature Selection Enhancement To Evaluate Attack Detection In The Internet Of Things Environment, Khawlah Harahsheh, Rami Al-Naimat, Chung-Hao Chen Jan 2024

Using Feature Selection Enhancement To Evaluate Attack Detection In The Internet Of Things Environment, Khawlah Harahsheh, Rami Al-Naimat, Chung-Hao Chen

Electrical & Computer Engineering Faculty Publications

The rapid evolution of technology has given rise to a connected world where billions of devices interact seamlessly, forming what is known as the Internet of Things (IoT). While the IoT offers incredible convenience and efficiency, it presents a significant challenge to cybersecurity and is characterized by various power, capacity, and computational process limitations. Machine learning techniques, particularly those encompassing supervised classification techniques, offer a systematic approach to training models using labeled datasets. These techniques enable intrusion detection systems (IDSs) to discern patterns indicative of potential attacks amidst the vast amounts of IoT data. Our investigation delves into various aspects …


Building A Benchmark For Industrial Iot Application, Pranay K. Tiru, Soma Tummala Oct 2023

Building A Benchmark For Industrial Iot Application, Pranay K. Tiru, Soma Tummala

College of Engineering Summer Undergraduate Research Program

In this project, we have developed a rather robust means of processing and displaying large sums of IoT data using several cutting-edge, industry-standard technologies. Our data pipeline integrates physical sensors that send various environmental data like temperature, humidity, and pressure. Once created, the data is then collected at an MQTT broker, streamed through a Kafka cluster, processed within a Spark Cluster, and stored in a Cassandra database.

In order to test the rigidity of the pipeline, we also created virtual sensors. This allowed us to send an immense amount of data, which wasn’t necessarily feasible with just the physical sensors. …


Experimental Evaluation Of Smart Electric Meters’ Resilience Under Cyber Security Attacks, Harsh Kumar, Oscar A. Alvarez, Sanjeev Kumar Jun 2023

Experimental Evaluation Of Smart Electric Meters’ Resilience Under Cyber Security Attacks, Harsh Kumar, Oscar A. Alvarez, Sanjeev Kumar

Electrical and Computer Engineering Faculty Publications and Presentations

For the first time, commercial grade smart meters have been subjected to cyber security attacks to understand their operation and security resilience under different attack scenarios. Cyber security is a matter of top concern for utility companies installing smart meters for remote collection of power usage data from customer premises. Keeping power-usage data secure and to maintain system’s resiliency under cyber security attacks is very important. In Smart electric grids, the power usage data from smart meters are periodically reported to the utility company. Reporting and remote monitoring of power usage data requires the use of data network protocols, which …


Performance Modeling And Optimization For A Fog-Based Iot Platform, Shensheng Tang Jun 2023

Performance Modeling And Optimization For A Fog-Based Iot Platform, Shensheng Tang

Electrical and Computer Engineering Faculty Publications

A fog-based IoT platform model involving three layers, i.e., IoT devices, fog nodes, and the cloud, was proposed using an open Jackson network with feedback. The system performance was analyzed for individual subsystems, and the overall system was based on different input parameters. Interesting performance metrics were derived from analytical results. A resource optimization problem was developed and solved to determine the optimal service rates at individual fog nodes under some constraint conditions. Numerical evaluations for the performance and the optimization problem are provided for further understanding of the analysis. The modeling and analysis, as well as the optimization design …


Iot Health Devices: Exploring Security Risks In The Connected Landscape, Abasi-Amefon Obot Affia, Hilary Finch, Woosub Jung, Issah Abubakari Samori, Lucas Potter, Xavier-Lewis Palmer May 2023

Iot Health Devices: Exploring Security Risks In The Connected Landscape, Abasi-Amefon Obot Affia, Hilary Finch, Woosub Jung, Issah Abubakari Samori, Lucas Potter, Xavier-Lewis Palmer

School of Cybersecurity Faculty Publications

The concept of the Internet of Things (IoT) spans decades, and the same can be said for its inclusion in healthcare. The IoT is an attractive target in medicine; it offers considerable potential in expanding care. However, the application of the IoT in healthcare is fraught with an array of challenges, and also, through it, numerous vulnerabilities that translate to wider attack surfaces and deeper degrees of damage possible to both consumers and their confidence within health systems, as a result of patient-specific data being available to access. Further, when IoT health devices (IoTHDs) are developed, a diverse range of …


Development Of A Data Science Curriculum For An Engineering Technology Program, Salih Sarp, Murat Kuzlu, Otilia Popescu, Vukica M. Jovanovic, Zafer Acar Jan 2023

Development Of A Data Science Curriculum For An Engineering Technology Program, Salih Sarp, Murat Kuzlu, Otilia Popescu, Vukica M. Jovanovic, Zafer Acar

Engineering Technology Faculty Publications

Data science has gained the attention of various industries, educators, parents, and students thinking about their future careers. Statistics departments have traditionally offered data science courses for a long time. The main objective of these courses is to examine the fundamental concepts and theories. However, teaching data science courses has also expanded to other disciplines due to the vast amount of data being collected by numerous modern applications. Also, someone needs to learn how to collect and process data, especially from industrial devices, because of the recent development of Internet of Things (IoT) technologies. Hence, integrating data science into the …


An Optimized And Scalable Blockchain-Based Distributed Learning Platform For Consumer Iot, Zhaocheng Wang, Xueying Liu, Xinming Shao, Abdullah Alghamdi, Md. Shirajum Munir, Sujit Biswas Jan 2023

An Optimized And Scalable Blockchain-Based Distributed Learning Platform For Consumer Iot, Zhaocheng Wang, Xueying Liu, Xinming Shao, Abdullah Alghamdi, Md. Shirajum Munir, Sujit Biswas

School of Cybersecurity Faculty Publications

Consumer Internet of Things (CIoT) manufacturers seek customer feedback to enhance their products and services, creating a smart ecosystem, like a smart home. Due to security and privacy concerns, blockchain-based federated learning (BCFL) ecosystems can let CIoT manufacturers update their machine learning (ML) models using end-user data. Federated learning (FL) uses privacy-preserving ML techniques to forecast customers' needs and consumption habits, and blockchain replaces the centralized aggregator to safeguard the ecosystem. However, blockchain technology (BCT) struggles with scalability and quick ledger expansion. In BCFL, local model generation and secure aggregation are other issues. This research introduces a novel architecture, emphasizing …


Instantaneous Frequency Estimation Of Fm Signals Under Gaussian And Symmetric Alpha-Stable Noise: Deep Learning Versus Time-Frequency Analysis, Huda Saleem Razzaq, Zahir M. Hussain Jan 2023

Instantaneous Frequency Estimation Of Fm Signals Under Gaussian And Symmetric Alpha-Stable Noise: Deep Learning Versus Time-Frequency Analysis, Huda Saleem Razzaq, Zahir M. Hussain

Research outputs 2022 to 2026

Deep learning (DL) and machine learning (ML) are widely used in many fields but rarely used in the frequency estimation (FE) and slope estimation (SE) of signals. Frequency and slope estimation for frequency-modulated (FM) and single-tone sinusoidal signals are essential in various applications, such as wireless communications, sound navigation and ranging (SONAR), and radio detection and ranging (RADAR) measurements. This work proposed a novel frequency estimation technique for instantaneous linear FM (LFM) sinusoidal wave using deep learning. Deep neural networks (DNN) and convolutional neural networks (CNN) are classes of artificial neural networks (ANNs) used for the frequency and slope estimation …


Physical Layer Authenticated Image Encryption For Iot Network Based On Biometric Chaotic Signature For Mpfrft Ofdm System, Esam A. A. Hagras, Saad Aldosary, Haitham Khaled, Tarek Hassan Jan 2023

Physical Layer Authenticated Image Encryption For Iot Network Based On Biometric Chaotic Signature For Mpfrft Ofdm System, Esam A. A. Hagras, Saad Aldosary, Haitham Khaled, Tarek Hassan

Research outputs 2022 to 2026

In this paper, a new physical layer authenticated encryption (PLAE) scheme based on the multi-parameter fractional Fourier transform–Orthogonal frequency division multiplexing (MP-FrFT-OFDM) is suggested for secure image transmission over the IoT network. In addition, a new robust multi-cascaded chaotic modular fractional sine map (MCC-MF sine map) is designed and analyzed. Also, a new dynamic chaotic biometric signature (DCBS) generator based on combining the biometric signature and the proposed MCC-MF sine map random chaotic sequence output is also designed. The final output of the proposed DCBS generator is used as a dynamic secret key for the MPFrFT OFDM system in which …


Virtual Sensor Middleware: Managing Iot Data For The Fog-Cloud Platform, Fadi Almahamid, Hanan Lutfiyya, Katarina Grolinger Oct 2022

Virtual Sensor Middleware: Managing Iot Data For The Fog-Cloud Platform, Fadi Almahamid, Hanan Lutfiyya, Katarina Grolinger

Electrical and Computer Engineering Publications

This paper introduces the Virtual Sensor Middleware (VSM), which facilitates distributed sensor data processing on multiple fog nodes. VSM uses a Virtual Sensor as the core component of the middleware. The virtual sensor concept is redesigned to support functionality beyond sensor/device virtualization, such as deploying a set of virtual sensors to represent an IoT application and distributed sensor data processing across multiple fog nodes. Furthermore, the virtual sensor deals with the heterogeneous nature of IoT devices and the various communication protocols using different adapters to communicate with the IoT devices and the underlying protocol. VSM uses the publish-subscribe design pattern …


Towards Emulation Of Intelligent Iot Networks On Eu-Us Testbeds, Sachin Sharma, Saish Urumkar, Gianluca Fontanesi, Venkat Sai Suman Lamba Karanam, Boyang Hu, Byrav Ramamurthy, Avishek Nag Jul 2022

Towards Emulation Of Intelligent Iot Networks On Eu-Us Testbeds, Sachin Sharma, Saish Urumkar, Gianluca Fontanesi, Venkat Sai Suman Lamba Karanam, Boyang Hu, Byrav Ramamurthy, Avishek Nag

Conference papers

This paper introduces our project on experimental validation of intelligent Internet of Things (IoT) networks. The project is a part of the NGIAtlantic H2020 third open call to perform experiments on EU and US wireless testbeds. The project proposes five different experiments to be performed on EU/US testbeds: (1) automatic configuration/discovery of Software Defined Networking (SDN) in wireless IoT sensor networks, (2) Machine Learning (ML) assisted control and data traffic path discovery experiments, (3) GPU and Hadoop cluster assisted experiments for ML algorithms, (4) Inter-testbed experiments, and (5) Failure recovery intercity experiments. Further, initial experimentation on EU/US testbeds is explored …


Experimenting An Edge-Cloud Computing Model On The Gpulab Fed4fire Testbed, Vikas Tomer, Sachin Sharma Jul 2022

Experimenting An Edge-Cloud Computing Model On The Gpulab Fed4fire Testbed, Vikas Tomer, Sachin Sharma

Conference papers

There are various open testbeds available for testing algorithms and prototypes, including the Fed4Fire testbeds. This demo paper illustrates how the GPULAB Fed4Fire testbed can be used to test an edge-cloud model that employs an ensemble machine learning algorithm for detecting attacks on the Internet of Things (IoT). We compare experimentation times and other performance metrics of our model based on different characteristics of the testbed, such as GPU model, CPU speed, and memory. Our goal is to demonstrate how an edge-computing model can be run on the GPULab testbed. Results indicate that this use case can be deployed seamlessly …


Honeypot-Based Security Enhancements For Information Systems, Javier R. Franco Jun 2022

Honeypot-Based Security Enhancements For Information Systems, Javier R. Franco

FIU Electronic Theses and Dissertations

The purpose of this thesis is to explore honeypot-based security enhancements for information systems. First, we provide a comprehensive survey of the research that has been carried out on honeypots and honeynets for Internet of Things (IoT), Industrial Internet of Things (IIoT), and Cyber-physical Systems (CPS). We provide a taxonomy and extensive analysis of the existing honeypots and honeynets, state key design factors for the state-of-the-art honeypot/honeynet research and outline open issues. Second, we propose S-Pot, a smart honeypot framework based on open-source resources. S-Pot uses enterprise and IoT honeypots to attract attackers, learns from attacks via ML classifiers, and …


Cross-Atlantic Experiments On Eu-Us Test-Beds, Sachin Sharma, Avishek Nag, Byrav Ramamurthy May 2022

Cross-Atlantic Experiments On Eu-Us Test-Beds, Sachin Sharma, Avishek Nag, Byrav Ramamurthy

Articles

Today, there are a number of real testbeds worldwide among which Fed4Fire testbeds are prominent in the EU, while POWDER and COSMOS are prominent in the US. This paper aims to validate inter-testbed experiments between the EU and the US by connecting a number of Fed4Fire and US testbeds as part of an NGIAtlantic project. The goal is to compare the hop count, the topology formed, the maximum bandwidth permitted, and the loss and jitter that occurred between different testbeds. Additionally, Software Defined Networking (SDN) experiments between EU and US testbeds are conducted, and an edge-computing use case is developed …


Machine Learning-Based Device Type Classification For Iot Device Re- And Continuous Authentication, Kaustubh Gupta Apr 2022

Machine Learning-Based Device Type Classification For Iot Device Re- And Continuous Authentication, Kaustubh Gupta

Department of Computer Science and Engineering: Dissertations, Theses, and Student Research

Today, the use of Internet of Things (IoT) devices is higher than ever and it is growing rapidly. Many IoT devices are usually manufactured by home appliance manufacturers where security and privacy are not the foremost concern. When an IoT device is connected to a network, currently there does not exist a strict authentication method that verifies the identity of the device, allowing any rogue IoT device to authenticate to an access point. This thesis addresses the issue by introducing methods for continuous and re-authentication of static and dynamic IoT devices, respectively. We introduce mechanisms and protocols for authenticating a …


Future Wireless Networking Experiments Escaping Simulations, Sachin Sharma, Saish Urumkar, Gianluca Fontanesi, Byrav Ramamurthy, Avishek Nag Apr 2022

Future Wireless Networking Experiments Escaping Simulations, Sachin Sharma, Saish Urumkar, Gianluca Fontanesi, Byrav Ramamurthy, Avishek Nag

Articles

In computer networking, simulations are widely used to test and analyse new protocols and ideas. Currently, there are a number of open real testbeds available to test the new protocols. In the EU, for example, there are Fed4Fire testbeds, while in the US, there are POWDER and COSMOS testbeds. Several other countries, including Japan, Brazil, India, and China, have also developed next-generation testbeds. Compared to simulations, these testbeds offer a more realistic way to test protocols and prototypes. In this paper, we examine some available wireless testbeds from the EU and the US, which are part of an open-call EU …


Assessing Security Risks With The Internet Of Things, Faith Mosemann Apr 2022

Assessing Security Risks With The Internet Of Things, Faith Mosemann

Senior Honors Theses

For my honors thesis I have decided to study the security risks associated with the Internet of Things (IoT) and possible ways to secure them. I will focus on how corporate, and individuals use IoT devices and the security risks that come with their implementation. In my research, I found out that IoT gadgets tend to go unnoticed as a checkpoint for vulnerability. For example, often personal IoT devices tend to have the default username and password issued from the factory that a hacker could easily find through Google. IoT devices need security just as much as computers or servers …


Performance Evaluation Of An Edge Computing Implementation Of Hyperledger Sawtooth For Iot Data Security, Sean Connolly Jan 2022

Performance Evaluation Of An Edge Computing Implementation Of Hyperledger Sawtooth For Iot Data Security, Sean Connolly

Dissertations

Blockchain offers a potential solution to some of the security challenges faced by the internet-of-things (IoT) by using its practically immutable ledger to store data transactions. However, past applications of blockchain in IoT encountered limitations in the rate at which transactions were committed to the chain as new blocks. These limitations were often the result of the time-consuming and computationally expensive consensus mechanisms found in public blockchains. Hyperledger Sawtooth is an open-source private blockchain platform that offers an efficient proof-of-elapsed-time (PoET) consensus mechanism. Sawtooth has performed well in benchmarks against other blockchains. However, a performance evaluation for a practical application …


A Deep-Dive Into Cryptojacking Malware: From An Empirical Analysis To A Detection Method For Computationally Weak Devices, Ege Tekiner Nov 2021

A Deep-Dive Into Cryptojacking Malware: From An Empirical Analysis To A Detection Method For Computationally Weak Devices, Ege Tekiner

FIU Electronic Theses and Dissertations

Cryptojacking is an act of using a victim's computation power without his/her consent. Unauthorized mining costs extra electricity consumption and decreases the victim host's computational efficiency dramatically. In this thesis, we perform an extensive research on cryptojacking malware from every aspects. First, we present a systematic overview of cryptojacking malware based on the information obtained from the combination of academic research papers, two large cryptojacking datasets of samples, and numerous major attack instances. Second, we created a dataset of 6269 websites containing cryptomining scripts in their source codes to characterize the in-browser cryptomining ecosystem by differentiating permissioned and permissionless cryptomining …


A Proposal To Harmonize Bim And Iot Data Silos Using Blockchain Application, Zulkefly Abu Bakar, Malachy Mathews Dr Sep 2021

A Proposal To Harmonize Bim And Iot Data Silos Using Blockchain Application, Zulkefly Abu Bakar, Malachy Mathews Dr

Conference papers

The integration of Building Information Modelling (BIM) and Internet of Things (IoT) provide significant end-to-end benefits for the architecture, engineering, construction, and operations (AECO) industry. Example applications include on-site assembly services, data localization for built environment, occupancy performance measures and many other analyses that can be used to improve the built environment. However, silos in the BIM and IoT data exchange have impacted the digital process adoption in AECO industry, which aims to change the dynamics and behaviors of the current working process. Penzes, (2018) in his report, acknowledges the AECO industry as one of the most fragmented sectors with …


A Bibliometric Perspective Survey Of Iot Controlled Ai Based Swarm Robots, Rhea Sawant, Ariz Shaikh, Chetna Singh, Aman Aggarwal, Shivali Amit Wagle, Harikrishnan R, Priti Shahane May 2021

A Bibliometric Perspective Survey Of Iot Controlled Ai Based Swarm Robots, Rhea Sawant, Ariz Shaikh, Chetna Singh, Aman Aggarwal, Shivali Amit Wagle, Harikrishnan R, Priti Shahane

Library Philosophy and Practice (e-journal)

Robotics is the ­new-age domain of technology that deals with bringing a collaboration of all disciplines of sciences and engineering to create a mechanical machine that may or may not work entirely independently but definitely focuses on making human lives much easier. It has repeatedly shown its ability to change lives at home and in the industry. As the field of robotics research grows and reaches new worlds, the military is one area where advances can have a significant impact, and the government is aware of this. Military technology has come a long way from the days where soldiers had …


Development Of An Internet Of Things (Iot) Enabled Novel Wireless Multi Sensor Network For Infield Crop Monitoring, Nipuna Chamara Mar 2021

Development Of An Internet Of Things (Iot) Enabled Novel Wireless Multi Sensor Network For Infield Crop Monitoring, Nipuna Chamara

Department of Biological Systems Engineering: Dissertations and Theses

Multispectral imaging systems on satellite, aerial, and ground platforms are used commonly to monitor in-field crops in precision agriculture by farmers and researchers. Limited spatial and temporal resolution and weather dependence of the data collection are two main disadvantages of these methods. In-field sensor networks can continuously monitor environmental and plant physiological parameters by leveraging low-power computation and long-range communication technologies. We built and tested a novel sensor network equipped with soil moisture, multispectral and RGB imaging sensors in an experimental soybean field at Eastern Nebraska Research and Extension Center, NE, USA. 10 down-looking and 1 up-looking sensor node were …


Wearable Sensing Devices: Towards The Development Of A Personalized System For Construction Safety And Health Risk Mitigation, Chukwuma Nnaji, Ibukun Awolusi, Jeewoong Park, Alex Albert Jan 2021

Wearable Sensing Devices: Towards The Development Of A Personalized System For Construction Safety And Health Risk Mitigation, Chukwuma Nnaji, Ibukun Awolusi, Jeewoong Park, Alex Albert

Civil and Environmental Engineering and Construction Faculty Research

Wearable sensing devices (WSDs) are increasingly helping workers stay safe and healthy in several industries. However, workers, especially in the construction industry, have shown some aversion towards the use of WSDs due to their ability to capture specific information that may be considered personal and private. However, this revered information may provide some critical insight needed by management to plan and optimize worksite safety and support technology adoption in decision making. Therefore, there is a need to develop personalized WSD systems that are mutually beneficial to workers and management to ensure successful WSD integration. The present study aims to contribute …


Smart Parking Systems: Reviewing The Literature, Architecture And Ways Forward, Can Biyik, Zaheer Allam, Gabriele Pieri, Davide Moroni, Muftah O' Fraifer, Eoin O' Connell, Stephan Olariu, Muhammad Khalid Jan 2021

Smart Parking Systems: Reviewing The Literature, Architecture And Ways Forward, Can Biyik, Zaheer Allam, Gabriele Pieri, Davide Moroni, Muftah O' Fraifer, Eoin O' Connell, Stephan Olariu, Muhammad Khalid

Computer Science Faculty Publications

The Internet of Things (IoT) has come of age, and complex solutions can now be implemented seamlessly within urban governance and management frameworks and processes. For cities, growing rates of car ownership are rendering parking availability a challenge and lowering the quality of life through increased carbon emissions. The development of smart parking solutions is thus necessary to reduce the time spent looking for parking and to reduce greenhouse gas emissions. The principal role of this research paper is to analyze smart parking solutions from a technical perspective, underlining the systems and sensors that are available, as documented in the …


Generic Design Methodology For Smart Manufacturing Systems From A Practical Perspective, Part I—Digital Triad Concept And Its Application As A System Reference Model, Zhuming Bi, Wen-Jun Zhang, Chong Wu, Chaomin Luo, Lida Xu Jan 2021

Generic Design Methodology For Smart Manufacturing Systems From A Practical Perspective, Part I—Digital Triad Concept And Its Application As A System Reference Model, Zhuming Bi, Wen-Jun Zhang, Chong Wu, Chaomin Luo, Lida Xu

Information Technology & Decision Sciences Faculty Publications

Rapidly developed information technologies (IT) have continuously empowered manufacturing systems and accelerated the evolution of manufacturing system paradigms, and smart manufacturing (SM) has become one of the most promising paradigms. The study of SM has attracted a great deal of attention for researchers in academia and practitioners in industry. However, an obvious fact is that people with different backgrounds have different expectations for SM, and this has led to high diversity, ambiguity, and inconsistency in terms of definitions, reference models, performance matrices, and system design methodologies. It has been found that the state of the art SM research is limited …


Generic Design Methodology For Smart Manufacturing Systems From A Practical Perspective. Part Ii—Systematic Designs Of Smart Manufacturing Systems, Zhuming Bi, Wen-Jun Zhang, Chong Wu, Chaomin Luo, Lida Xu Jan 2021

Generic Design Methodology For Smart Manufacturing Systems From A Practical Perspective. Part Ii—Systematic Designs Of Smart Manufacturing Systems, Zhuming Bi, Wen-Jun Zhang, Chong Wu, Chaomin Luo, Lida Xu

Information Technology & Decision Sciences Faculty Publications

In a traditional system paradigm, an enterprise reference model provides the guide for practitioners to select manufacturing elements, configure elements into a manufacturing system, and model system options for evaluation and comparison of system solutions against given performance metrics. However, a smart manufacturing system aims to reconfigure different systems in achieving high-level smartness in its system lifecycle; moreover, each smart system is customized in terms of the constraints of manufacturing resources and the prioritized performance metrics to achieve system smartness. Few works were found on the development of systematic methodologies for the design of smart manufacturing systems. The novel contributions …


Sensitray: An Integrated Measuring Device For Monitoring Children’S Mealtime Dietary Intake, Hunter S. Guru, Anthony D. Weng, Santosh Pitla, Dipti Dev Jan 2021

Sensitray: An Integrated Measuring Device For Monitoring Children’S Mealtime Dietary Intake, Hunter S. Guru, Anthony D. Weng, Santosh Pitla, Dipti Dev

Department of Child, Youth, and Family Studies: Faculty Publications

Childhood nutrition establishes consumption norms that affect an individual’s health over the course of their lives. However, early nutrition interventions to establish such norms are uncommon owing to the various inefficiencies associated with current methods of measuring childhood nutrition. Here, we present an IoT measuring device, called the SensiTray, which accurately tracks mealtime intake in a child-friendly and cost-effective fashion. Principal technologies underlying the SensiTray (including mass-sensing technologies, microcontrollers) are identified and analyzed, along with other design choices. Operation of the SensiTray is explained with special attention given to SensiTray software peripherals and algorithms. Preliminary testing consisted of static and …


A Low-Cost Secure Iot Mechanism For Monitoring And Controlling Polygeneration Microgrids, Josué Martínez-Martínez, Diego Aponte-Roa, Idalides Vergara-Laurens, Wayne Weaver Dec 2020

A Low-Cost Secure Iot Mechanism For Monitoring And Controlling Polygeneration Microgrids, Josué Martínez-Martínez, Diego Aponte-Roa, Idalides Vergara-Laurens, Wayne Weaver

Michigan Tech Publications

The use of Internet-connected devices at homes has increased to monitor energy consumption. Furthermore, renewable energy sources have also increased, reducing electricity bills. However, the high cost of the equipment limits the use of these technologies. This paper presents a low-cost secured-distributed Internet of Things (IoT) system to monitor and control devices connected in a polygeneration microgrid, as a combined power system for local loads with renewable sources. The proposed mechanism includes a Wireless Sensor Actuator Networked Control System that links network nodes using the IEEE 802.15.4 standard. The Internet communication enables the monitor and control of devices using a …


Routing Optimization In Heterogeneous Wireless Networks For Space And Mission-Driven Internet Of Things (Iot) Environments, Sara El Alaoui Aug 2020

Routing Optimization In Heterogeneous Wireless Networks For Space And Mission-Driven Internet Of Things (Iot) Environments, Sara El Alaoui

Department of Electrical and Computer Engineering: Dissertations, Theses, and Student Research

As technological advances have made it possible to build cheap devices with more processing power and storage, and that are capable of continuously generating large amounts of data, the network has to undergo significant changes as well. The rising number of vendors and variety in platforms and wireless communication technologies have introduced heterogeneity to networks compromising the efficiency of existing routing algorithms. Furthermore, most of the existing solutions assume and require connection to the backbone network and involve changes to the infrastructures, which are not always possible -- a 2018 report by the Federal Communications Commission shows that over 31% …


Efficient Key Management Schemes For Smart Grid, Mumin Cebe Jul 2020

Efficient Key Management Schemes For Smart Grid, Mumin Cebe

FIU Electronic Theses and Dissertations

With the increasing digitization of different components of Smart Grid by incorporating smart(er) devices, there is an ongoing effort to deploy them for various applications. However, if these devices are compromised, they can reveal sensitive information from such systems. Therefore, securing them against cyber-attacks may represent the first step towards the protection of the critical infrastructure. Nevertheless, realization of the desirable security features such as confidentiality, integrity and authentication relies entirely on cryptographic keys that can be either symmetric or asymmetric. A major need, along with this, is to deal with managing these keys for a large number of devices …