Fig 3 - uploaded by Madhusanka Liyanage
Content may be subject to copyright.
Communication Protocol for data download process

Communication Protocol for data download process

Source publication
Conference Paper
Full-text available
The proliferation of the Internet of Things (IoT) technologies have strengthen the self-monitoring and autonomous characteristics of the sensor networks deployed in numerous application areas. The recent developments of the edge computing paradigms have also enabled on-site processing and managing the capabilities of sensor networks. In this paper,...

Context in source publication

Context 1
... the attribute request is acknowledged by BLE module, drone starts reading data and sends acknowledgment to the BLE module to ensure a reliable communication between the drone and the BLE module. This process continues until the drone retrieves required information and then the drone 2) Data download process: Figure 3 illustrates the message sequence between drone, BLE module and the sensor node during data download. Similar to the upload procedure, drone initiates the connection process by sending connection request to the BLE module of the sensor node. ...

Similar publications

Article
Full-text available
As a mode of processing task request, edge computing paradigm can reduce task delay and effectively alleviate network congestion caused by the proliferation of Internet of things(IoT) devices compared with cloud computing. However, in the actual construction of the network, there are various edge autonomous subnets in the adjacent areas, which lead...
Research
Full-text available
Cloud computing system delivers computing resources as a service over the network. During the last few years clod computing technology has gained attention due to its autonomous and cost effective services. It is responsible for the growth of IT industry. But cloud computing has various security challenges that hinder the rapid adoption of this com...

Citations

... Our intention is to create an evasion attack [3], where an adversary attempts to fool a machine learning algorithm into making a wrong decision [4]. Fig. 1 illustrates a vulnerable network where an unmanned aerial vehicle (UAV) communicates with ground devices [42]- [45]. Whereas several works considered deep learning thechniques to identify the UAVs based on their emitted signal [46], [47]. ...
Article
Full-text available
Generative adversarial networks (GANs), a category of deep learning models, have become a cybersecurity concern for wireless communication systems. These networks enable potential attackers to deceive receivers that rely on convolutional neural networks (CNNs) by transmitting deceptive wireless signals that are statistically indistinguishable from genuine ones. While GANs have been used before for digitally modulated single-carrier waveforms, this study explores their applicability to model filtered multi-carrier waveforms, such as orthogonal frequency-division multiplexing (OFDM), filtered orthogonal FDM (F-OFDM), generalized FDM (GFDM), filter bank multi-carrier (FBMC), and universal filtered MC (UFMC). In this research, an evasion attack is conducted using GAN-generated counterfeit filtered multi-carrier signals to trick the target receiver. The results show that there is a remarkable 99.7% probability of the receiver misclassifying these GAN-based fabricated signals as authentic ones. This highlights the need for urgent investigation into the development of preventive measures to address this concerning vulnerability.
... BLE drones are also able to transmit data faster and with greater accuracy. This strength makes them ideal for surveillance, mapping, aerial reconnaissance, and asset monitoring applications (Long, 2021;Rajakaruna et al., 2019;Singh & Swaminathan, 2022). BLE UAS can be easily integrated with other enterprise systems, allowing for seamless data exchange and faster decision-making (Rajakaruna et al., 2018;Stute, Heinrich, Lorenz, & Hollick, 2021;Vucic & Axell, 2022). ...
Article
Full-text available
In times of technological advancements, the use of aerial vehicles (UAVs), commonly known as drones, has become increasingly prevalent across various commercial and industrial sectors. UAVs find applications in agriculture, filmmaking, law enforcement, package delivery, aerial photography, videography, etc. There are benefits associated with utilizing UAVs. One key advantage is their ability to cover areas quickly and efficiently while accessing locations that may be challenging or hazardous for humans. Wireless communication technologies play a role in ensuring the functioning of Unmanned Aircraft Systems (UAS). Without these technologies, the United States of America would face difficulties communicating with ground control stations or relaying information to operators. This would significantly impede the country’s mission execution and overall responsibilities. Wireless communication technologies (WCT) enable the United States to maintain awareness—essential for achieving successful and secure operations. Additionally, wireless technologies allow for Unmanned Aerial Systems (UAS) control, which is crucial for missions carried out in hostile or dangerous environments. The increasing usage of drones has highlighted the need to improve networks in the United States focusing on their ability to work together effectively handle volumes of data and provide reliable broadband connectivity. This research delves into communication technologies, in this domain emphasizing their advantages, limitations, industry standards and potential areas for future investigation to address the challenges revealed by this study.
... Approaches to bypass the cryptographic measures with electromagnetic, optical, or acoustic emanations called compromising emanations are mentioned in [41]. Apart from that attacks such as malware, key-loggers, blinding the sight of the remote pilot with laser, identity spoofing, cross-layer, multi-protocol and various DoS or DDoS attacks focused on exhausting the battery of the UAV is plausible [52,108]. In the two methods where UAV maintains direct connectivity with the BS for controlling or computational offloading, the connectivity could be subjected to interposing attacks plausible on the air interface [110]. ...
Article
Full-text available
The future of mobile and internet technologies are manifesting advancements beyond the existing scope of science. The concepts of automated driving, augmented-reality, and machine-type-communication are quite sophisticated; and requires an elevation of the current mobile infrastructure for launching. The 5G mobile technology serves as the solution; though lacks a proximate networking infrastructure to satisfy the service guarantees. Multi-Access Edge Computing envisage such an edge computing platform. In this survey, we are revealing security vulnerabilities of key 5G based use cases deployed in the MEC context. Probable security flows of each case are specified, while countermeasures are proposed for mitigating them.
... The analysis system then collates and analyzes the vulnerability information about the scanned devices received from the collection system. The authors of [22] propose a system model that provides a secure end-to-end connection between low-power IoT devices and unmanned aerial vehicles used to solve the problem of collecting and processing information in heterogeneous wireless sensor networks. ...
Conference Paper
The number of systems responsible for the processing and transmission of sensory information is steadily growing, which naturally gives rise to the need for a scalable trusted Platform that provides the formation of end-to-end processes in various priority sectors of the economy and social sphere and is an automated information control system for collecting and processing sensory information. When designing such a system, it is important to pay sufficient attention to the elaboration of the information security issue, which inevitably is based on the development of a threat model. The proposed Platform is subdivided into 6 subsystems: micromodule subsystem, end device subsystem, border gateway subsystem, cloud service subsystem, operating system subsystem, and user application subsystem. This article proposes a threat model for each subsystem of the Platform, as well as lists of threats to the Platform’s subsystems and their operating environments.
... However, there is limited research conducted in the area of collaboration of drone systems and low power IoT devices. In this setting, a recent research by Rajakaruna et al.,in [4], introduces a system model enabling end-to-end connectivity for low-power IoT devices with UAVs. Extensive study in the considered fields reveals that further research is required on this front. ...
... However, for the proposed project, the relaying interval from WSN should ideally be larger. Rajakaruna et al. [4] introduced a system model which enables end-to-end secure connectivity between low-power IoT devices and UAVs, helping to manage the monitoring of a heterogeneous WSN. They have considered IoT devices with diversified sensors communicating through BLE and drone performing as an edge server. ...
... However, for a larger grid area, sensor nodes are uniformly arranged such that each sensor node has more than two closest neighbours located at equal distances. Examples for these arrangements include square arrangement [4], triangular-fill square arrangement and hexagonal arrangement. The square or triangular-fill square arrangements can be used to implement WSNs in areas having similar lengths and widths, whereas hexagonal arrangements can be used to cover areas more resembling to a circular region. ...
... Surveillance scenarios (eg: traffic, power line, agriculture and environment) are one of the key aspects in IoT. UAVs can be used to facilitate the requirements of these applications [138], [139]. In [140], Motlagh et al. presented an integrative IoT platform operational in the sky, using UAVs equipped with diverse IoT devices. ...
Article
Full-text available
Internet of Things (IoT) is an emerging technology that makes people's lives smart by conquering a plethora of diverse application and service areas. In near future, the fifth-generation (5G) wireless networks provide the connectivity for this IoT ecosystem. It has been carefully designed to facilitate the exponential growth in the IoT field. Network slicing is one of the key technologies in the 5G architecture that has the ability to divide the physical network into multiple logical networks (i.e. slices) with different network characteristics. Therefore, network slicing is also a key enabler of realisation of IoT in 5G. Network slicing can satisfy the various networking demands by heterogeneous IoT applications via dedicated slices. In this survey, we present a comprehensive analysis of the exploitation of network slicing in IoT realisation. We discuss network slicing utilisation in different IoT application scenarios, along with the technical challenges that can be solved via network slicing. Furthermore, integration challenges and open research problems related to the network slicing in the IoT realisation are also discussed in this paper. Finally, we discuss the role of other emerging technologies and concepts, such as blockchain and Artificial Intelligence/Machine Learning(AI/ML) in network slicing and IoT integration.
... However, there is limited research conducted in the area of collaboration of drone systems and low power IoT devices. In this setting, a recent research by Rajakaruna et al.,in [4], introduces a system model enabling end-to-end connectivity for low-power IoT devices with UAVs. Extensive study in the considered fields reveals that further research is required on this front. ...
... However, for the proposed project, the relaying interval from WSN should ideally be larger. Rajakaruna et al. [4] introduced a system model which enables end-to-end secure connectivity between low-power IoT devices and UAVs, helping to manage the monitoring of a heterogeneous WSN. They have considered IoT devices with diversified sensors communicating through BLE and drone performing as an edge server. ...
... However, for a larger grid area, sensor nodes are uniformly arranged such that each sensor node has more than two closest neighbours located at equal distances. Examples for these arrangements include square arrangement [4], triangular-fill square arrangement and hexagonal arrangement. The square or triangular-fill square arrangements can be used to implement WSNs in areas having similar lengths and widths, whereas hexagonal arrangements can be used to cover areas more resembling to a circular region. ...
... Data is central to the IoT paradigm. IoT data is collected to serve many different types of applications such as smart home, smart city, wearable, healthcare, smart grid, autonomous vehicles, smart farms, industries and manufacturing, and retail sector [4]- [6]. Therefore, numerous heterogeneous sensors exist to measure a variety of parameters. ...
Conference Paper
Full-text available
Data is central to the Internet of Things (IoT) ecosystem. Most of the current IoT systems are using centralized cloud-based data sharing systems. Involvement of such third-party service provider requires also trust from both sensor owner and sensor data user. Moreover, the fees need to be paid for their services. To tackle both the scalability and trust issues and to automatize the payments, this paper presents a blockchain based proxy re-encryption scheme. The system stores the IoT data in a distributed cloud after encryption. To share the collected IoT data, the system establishes runtime dynamic smart contracts between the sensor and the data user without the involvement of a trusted third party. It also uses an efficient proxy re-encryption scheme which allows that the data is only visible by the owner and the person present in the smart contract. The proposed system is implemented in an Ethereum based testbed to analyze the performance and security properties.
Article
Recent years have witnessed rapid adoption of low-power Wireless Sensor-Actuator Networks (WSANs) in process industries. To meet the critical demand for reliable and real-time communication in harsh industrial environments, the industrial WSAN standards make a set of specific design choices, such as employing the Time Slotted Channel Hopping (TSCH) technique. Such design choices distinguish industrial WSANs from traditional Wireless Sensor Networks (WSNs), which were designed for best-effort services. Recently, there has been increasing interest in developing new methods to enable autonomous transmission scheduling for industrial WSANs that run TSCH and the Routing Protocol for Low-Power and Lossy Networks (RPL). Our study shows that the current approaches fail to consider the traffic loads of different devices when assigning time slots and channels, which significantly compromises network performance when facing high data rates. In this paper, we introduce a novel Autonomous Traffic-Aware transmission scheduling method for industrial WSANs. The device that runs ATRIA can detect its traffic load based on its local routing information and then schedule its transmissions accordingly without the need to exchange information with neighboring devices. Experimental results show ATRIA provides significantly higher end-to-end network reliability and lower end-to-end latency without introducing additional overhead compared with a state-of-the-art baseline.