Flowchart showing the data access via Android application and web browser using the Flask API.

Flowchart showing the data access via Android application and web browser using the Flask API.

Source publication
Article
Full-text available
Detecting infected female mosquitoes can be vital when they transmit harmful diseases such as dengue, malaria, and others. Infected mosquitoes can lay hundreds of eggs in breeding locations, and newborns can transmit diseases to more victims. Hence, gathering and monitoring climate data and environmental conditions for mosquito research can be valu...

Context in source publication

Context 1
... database needs to store a large amount of data coming from the remote data stations, so when MySQL compares to MongoDB and other databases, MySQL is more stable for storing the data [26,27]. The flowchart in Figure 7 shows the data access process using an Android application or web browser. Using an API (Application Programming Interface) URL (Uniform Resource Locator) from the Flash API, the Android application or web browser can use an HTTP (Hypertext Transfer Protocol) GET request to receive a response from the cluster. ...

Citations

... • Containerization: Kubernetes simplifies the deployment and scaling of containerized applications [22], ensuring consistent behavior across diverse environments; • Resource Management: Kubernetes optimize the allocation of computing resources within the cluster, thereby enhancing efficiency and scalability [23]; • Fault Tolerance: Leveraging its self-healing capabilities, Kubernetes ensures uninterrupted operation by automatically replacing failed containers or nodes. ...
Article
Full-text available
Environmental monitoring systems have gained prominence across diverse applications, necessitating the integration of cutting-edge technologies. This article comprehensively explores such a system, emphasizing the integration of a Raspberry Pi cluster with the BME680 environmental sensor within a Kubernetes framework. This study encompasses the technical aspects of hardware configuration and places a significant focus on security benchmarks and robustness validation. The environmental monitoring infrastructure discussed in this article delves into the intricacies of the Raspberry Pi cluster’s hardware setup, including considerations for scalability and redundancy. This research addresses critical security gaps in contemporary environmental monitoring systems, particularly vulnerabilities linked to IoT deployments. Amidst increasing threats, this study introduces a robust framework that integrates advanced security tools—HashiCorp (San Francisco, CA, USA) Vault v1.16 for dynamic secret management and OpenID Connect for authentication processes—to enhance applications and system integrity and resilience within the Kubernetes environment. The approach involves a multi-layered security architecture that fortifies the storage and management of credentials and ensures authenticated and authorized interactions within IoT networks. Furthermore, our research incorporates a series of security benchmark tests, including vulnerability scanning, penetration testing, and access control assessments. Additionally, this article addresses crucial aspects related to data management and analysis, detailing the methodologies employed for storing, processing, and deriving insights from the collected environmental data. It further explores the integration of the monitoring system with existing infrastructure and systems, facilitating seamless data sharing and interoperability and offering valuable insights into the system’s ability to withstand potential threats and vulnerabilities. The integration of Raspberry Pi clusters with BME680 environmental sensors within a Kubernetes-managed framework significantly enhances the scalability and security of IoT systems. This study quantifies the improvements, demonstrating at least a 30% enhancement in system responsiveness and a minimum 40% reduction in vulnerability exposures, as verified by extensive security benchmarks, including penetration testing. These advancements facilitate robust, scalable IoT deployments, with potential applications extending beyond environmental monitoring to include industrial and urban settings. The incorporation of dynamic secret management with HashiCorp Vault and secure authentication with OpenID Connect provides a blueprint for developing resilient IoT architectures capable of supporting high-security and high-availability applications. In conclusion, this article contributes to the expanding body of knowledge in IoT and environmental monitoring and establishes a strong foundation for future work. These outcomes suggest promising directions for further research in secure IoT applications and present practical implications for the deployment of secure and scalable IoT solutions in critical infrastructures.
... IoT cloud servers make it easy to communicate with sensor nodes, manage them, and integrate them with applications. If the different types of hardware, connectivity, and sensors are taken into account, a tool that allows to make changes, escalate processes and respond to incidents in a centralized way becomes essential, [34]. ...
Article
The problems related to the proper management and control in the distribution of potable water affect environmental sustainability generated by leaks and breaks in the infrastructure, causing leaks and loss of water. According to reports from the National Superintendence of Sanitation Services of Peru, more than 50% of complaints about the water service are related to billing problems and water leaks. It is for this reason that technologies such as the Internet of Things technology contribute to generating solutions for the automatic acquisition of data in residences and houses. That is why this paper aims to use long-range and low-power wireless communication systems to improve the service-oriented to the control of the water distribution network, monitoring of vandalism, and detection of anomalous events, reducing response time and economic losses. The paper's development methodology considers the implementation of a water controller node with flow control sensors and solenoid valves and a gateway with Lora communication. In addition, a solenoid valve control circuit and a remote visualization and control system are implemented. The results indicate that the implemented nodes allow adequate monitoring and control in real-time of the water flow, contributing to the adequate management of its consumption and supporting the detection of anomalous events using a Web application.