Next Issue
Volume 4, March
Previous Issue
Volume 3, September
 
 

IoT, Volume 3, Issue 4 (December 2022) – 6 articles

Cover Story (view full-size image): Using unmanned aerial vehicles (UAVs) as an integrated sensing and communication platform has widespread applications. However, in UAV-based solutions, several challenges such as the limited battery, onboard processing capabilities, and connectivity for data collection and offloading from different points of interest necessitate the efficient trajectory planning of UAVs. In this study, we develop a multi-UAV system to collect data dynamically in an infrastructure-deficient environment. Our approach jointly considers the trajectory optimization of the UAV-based access platform and the stability of the data queues at each UAV. We evaluate the performance of the proposed solution by performing simulations against several baselines and parameter settings. View this paper
  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list.
  • You may sign up for e-mail alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.
Order results
Result details
Select all
Export citation of selected articles as:
19 pages, 1568 KiB  
Article
Performance Analysis of OPC UA for Industrial Interoperability towards Industry 4.0
by Marc Ladegourdie and Jonathan Kua
IoT 2022, 3(4), 507-525; https://doi.org/10.3390/iot3040027 - 19 Dec 2022
Cited by 5 | Viewed by 5093
Abstract
Open Platform Communications Unified Architecture (OPC UA) incorporates a wide range of features and covers most of the requirements for a platform-independent interoperability standard which can be used to transmit data and information from the factory production floor to the enterprise and management [...] Read more.
Open Platform Communications Unified Architecture (OPC UA) incorporates a wide range of features and covers most of the requirements for a platform-independent interoperability standard which can be used to transmit data and information from the factory production floor to the enterprise and management level. Due to its highly scalable and interoperable architecture, it is well-positioned for future deployment in smart embedded devices towards Industry 4.0, especially in environments where there are heterogeneous communication nodes. In this paper, we aim to evaluate the performance of OPC UA for communication in Industrial Internet of Things (IIoT) environments to better understand the technical implementation of OPC UA and the feasibility of incorporating OPC UA directly to resource-constrained edge devices. We propose an architectural system framework for OPC UA performance evaluation across a wide range of experiments. Our experimental results demonstrated the efficacy of the proposed system and evaluation framework. The OPC UA-based IIoT system architecture and budget-friendly/cost-effective testbed setup can be flexibly adopted for protocol testing, prototyping and educational purposes. Full article
Show Figures

Figure 1

14 pages, 1320 KiB  
Article
Defining and Assessing Quality in IoT Environments: A Survey
by Aggeliki Sgora and Periklis Chatzimisios
IoT 2022, 3(4), 493-506; https://doi.org/10.3390/iot3040026 - 07 Dec 2022
Cited by 2 | Viewed by 2241
Abstract
With the proliferation of multimedia services, Quality of Experience (QoE) has gained a lot of attention. QoE ties together the users’ needs and expectations to multimedia application and network performance. However, in various Internet of Things (IoT) applications such as healthcare, surveillance systems, [...] Read more.
With the proliferation of multimedia services, Quality of Experience (QoE) has gained a lot of attention. QoE ties together the users’ needs and expectations to multimedia application and network performance. However, in various Internet of Things (IoT) applications such as healthcare, surveillance systems, traffic monitoring, etc., human feedback can be limited or infeasible. Moreover, for immersive augmented and virtual reality, as well as other mulsemedia applications, the evaluation in terms of quality cannot only focus on the sight and hearing senses. Therefore, the traditional QoE definition and approaches for evaluating multimedia services might not be suitable for the IoT paradigm, and more quality metrics are required in order to evaluate the quality in IoT. In this paper, we review existing quality definitions, quality influence factors (IFs) and assessment approaches for IoT. This paper also introduces challenges in the area of quality assessment for the IoT paradigm. Full article
(This article belongs to the Special Issue Advanced Quality of Service Approaches in Edge Computing)
Show Figures

Figure 1

20 pages, 962 KiB  
Article
Optimizing Trajectory and Dynamic Data Offloading Using a UAV Access Platform
by Amanjot Kaur, Shashi Shekhar Jha, Jiong Jin and Hadi Ghaderi
IoT 2022, 3(4), 473-492; https://doi.org/10.3390/iot3040025 - 24 Nov 2022
Cited by 1 | Viewed by 1782
Abstract
The use of unmanned aerial vehicles (UAV) as an integrated sensing and communication platform is emerging for surveillance and tracking applications, especially in large infrastructure-deficient environments. In this study, we develop a multi-UAV system to collect data dynamically in a resource-constrained context. The [...] Read more.
The use of unmanned aerial vehicles (UAV) as an integrated sensing and communication platform is emerging for surveillance and tracking applications, especially in large infrastructure-deficient environments. In this study, we develop a multi-UAV system to collect data dynamically in a resource-constrained context. The proposed approach consists of an access platform called Access UAV (A_UAV) that stochastically coordinates the data collection from the Inspection-UAVs (I_UAVs) equipped with a visual sensor to relay the same to the cloud. Our approach jointly considers the trajectory optimization of A_UAV and the stability of the data queues at each UAV. In particular, the Distance and Access Latency Aware Trajectory (DLAT) optimization for A_UAVs is developed, which generates a fair access schedule for I_UAVs. Moreover, a Lyapunov-based online optimization ensures the system stability of the average queue backlogs for dynamic data collection while minimizing total system energy. Coordination between I_UAV and A_UAV is achieved through a message-based mechanism. The simulation results validate the performance of our proposed approach against several baselines under different parameter settings. Full article
Show Figures

Figure 1

23 pages, 9226 KiB  
Article
Living in the Dark: MQTT-Based Exploitation of IoT Security Vulnerabilities in ZigBee Networks for Smart Lighting Control
by Noon Hussein and Armstrong Nhlabatsi
IoT 2022, 3(4), 450-472; https://doi.org/10.3390/iot3040024 - 23 Nov 2022
Cited by 5 | Viewed by 4135
Abstract
The Internet of Things (IoT) has provided substantial enhancements to the communication of sensors, actuators, and their controllers, particularly in the field of home automation. Home automation is experiencing a huge rise in the proliferation of IoT devices such as smart bulbs, smart [...] Read more.
The Internet of Things (IoT) has provided substantial enhancements to the communication of sensors, actuators, and their controllers, particularly in the field of home automation. Home automation is experiencing a huge rise in the proliferation of IoT devices such as smart bulbs, smart switches, and control gateways. However, the main challenge for such control systems is how to maximize security under limited resources such as low-processing power, low memory, low data rate, and low-bandwidth IoT networks. In order to address this challenge the adoption of IoT devices in automation has mandated the adoption of secure communication protocols to ensure that compromised key security objectives, such as confidentiality, integrity, and availability are addressed. In light of this, this work evaluates the feasibility of MQTT-based Denial of Service (DoS) attacks, Man-in-the-Middle (MitM), and masquerade attacks on a ZigBee network, an IoT standard used in wireless mesh networks. Performed through MQTT, the attacks extend to compromise neighboring Constrained Application Protocol (CoAP) nodes, a specialized service layer protocol for resource-constrained Internet devices. By demonstrating the attacks on an IKEA TRÅDFRI lighting system, the impact of exploiting ZigBee keys, the basis of ZigBee security, is shown. The reduction of vulnerabilities to prevent attacks is imperative for application developers in this domain. Two Intrusion Detection Systems (IDSs) are proposed to mitigate against the proposed attacks, followed by recommendations for solution providers to improve IoT firmware security. The main motivation and purpose of this work is to demonstrate that conventional attacks are feasible and practical in commercial home automation IoT devices, regardless of the manufacturer. Thus, the contribution to the state-of-the-art is the design of attacks that demonstrate how known vulnerabilities can be exploited in commercial IoT devices for the purpose of motivating manufacturers to produce IoT systems with improved security. Full article
Show Figures

Figure 1

15 pages, 1742 KiB  
Article
Transient Analysis of a Finite Queueing System with Bulk Arrivals in IoT-Based Edge Computing Systems
by Shensheng Tang
IoT 2022, 3(4), 435-449; https://doi.org/10.3390/iot3040023 - 17 Nov 2022
Viewed by 2021
Abstract
Queueing models can be used for making decisions about the resources required to provide high quality service. In this paper, a finite capacity single server queueing model with bulk arrivals is studied in IoT-based edge computing systems. The transient analysis of the model [...] Read more.
Queueing models can be used for making decisions about the resources required to provide high quality service. In this paper, a finite capacity single server queueing model with bulk arrivals is studied in IoT-based edge computing systems. The transient analysis of the model is carried out and the transient analytical solution to the system is derived with a group of recursive coefficients by using the ordinary differential equations (ODEs) technique. From which the steady-state probabilities are solved. Then, some performance metrics of interest are derived along with numerical results. Although the paper is initiated from the IoT based edge computing platform, the proposed system modeling and analysis method can be extended to more general situations such as telecommunication, manufacturing, transportation, and many other areas that are closely related to people’s daily lives. Full article
Show Figures

Figure 1

37 pages, 2282 KiB  
Review
A Holistic Overview of the Internet of Things Ecosystem
by Gaetanino Paolone, Danilo Iachetti, Romolo Paesani, Francesco Pilotti, Martina Marinelli and Paolino Di Felice
IoT 2022, 3(4), 398-434; https://doi.org/10.3390/iot3040022 - 26 Oct 2022
Cited by 9 | Viewed by 6230
Abstract
The Internet of Things (IoT) is a complex ecosystem of connected devices that exchange data over a wired or wireless network and whose final aim is to provide services either to humans or machines. The IoT has seen rapid development over the past [...] Read more.
The Internet of Things (IoT) is a complex ecosystem of connected devices that exchange data over a wired or wireless network and whose final aim is to provide services either to humans or machines. The IoT has seen rapid development over the past decade. The total number of installed connected devices is expected to grow exponentially in the near future, since more and more domains are looking for IoT solutions. As a consequence, an increasing number of developers are approaching IoT technology for the first time. Unfortunately, the number of IoT-related studies published every year is becoming huge, with the obvious consequence that it would be impossible for anyone to predict the time that could be necessary to find a paper talking about a given problem at hand. This is the reason why IoT-related discussions have become predominant in various practitioners’ forums, which moderate thousands of posts each month. The present paper’s contribution is twofold. First, it aims at providing a holistic overview of the heterogeneous IoT world by taking into account a technology perspective and a business perspective. For each topic taken into account, a tutorial introduction (deliberately devoid of technical content to make this document within the reach of non-technical readers as well) is provided. Then, a table of very recent review papers is given for each topic, as the result of a systematic mapping study. Full article
Show Figures

Figure 1

Previous Issue
Next Issue
Back to TopTop