[go: up one dir, main page]

Next Issue
Volume 5, September
Previous Issue
Volume 5, March
 
 

IoT, Volume 5, Issue 2 (June 2024) – 12 articles

Cover Story (view full-size image): Federated Learning (FL) is transforming Artificial Intelligence (AI) by enabling collaborative model training among multiple entities in a distributed fashion. With FL, sensitive data remain localized and only model parameters are exchanged with the server entrusted with the overall management of the training process. Despite wide applicability, FL requires AI practitioners to invest vast amounts of time manually configuring monitoring tools. To compensate, FedMon is introduced as a toolkit designed to ease the burden of FL monitoring by seamlessly integrating the probing interface with the FL deployment, automating metric extraction, providing a rich set of system, dataset, model, and experiment-level metrics, and providing the analytic means to assess trade-offs and compare different model training configurations. View this paper
  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list.
  • You may sign up for e-mail alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.
Order results
Result details
Select all
Export citation of selected articles as:
29 pages, 5577 KiB  
Article
Evaluating the Impact of Controlled Ultraviolet Light Intensities on the Growth of Kale Using IoT-Based Systems
by Suttipong Klongdee, Paniti Netinant and Meennapa Rukhiran
IoT 2024, 5(2), 449-477; https://doi.org/10.3390/iot5020021 - 15 Jun 2024
Viewed by 769
Abstract
Incorporating Internet of Things (IoT) technology into indoor kale cultivation holds significant promise for revolutionizing organic farming methodologies. While numerous studies have investigated the impact of environmental factors on kale growth in IoT-based smart agricultural systems, such as temperature, humidity, and nutrient levels, [...] Read more.
Incorporating Internet of Things (IoT) technology into indoor kale cultivation holds significant promise for revolutionizing organic farming methodologies. While numerous studies have investigated the impact of environmental factors on kale growth in IoT-based smart agricultural systems, such as temperature, humidity, and nutrient levels, indoor ultraviolet (UV) LED light’s operational efficiencies and advantages in organic farming still need to be explored. This study assessed the efficacy of 15 UV light-controlling indoor experiments in three distinct lighting groups: kale cultivated using conventional household LED lights, kale cultivated using specialized indoor UV lights designed for plant cultivation, and kale cultivated using hybrid household and LED grow lights. The real-time IoT-based monitoring of light, soil, humidity, and air conditions, as well as automated irrigation using a water droplet system, was employed throughout the experiment. The experimental setup for air conditioning maintained temperatures at a constant 26 degrees Celsius over the 45-day study period. The results revealed that a combination of daylight household lights and indoor 4000 K grow lights scored the highest, indicating optimal growth conditions. The second group exposed to warm white household and indoor grow red light exhibited slightly lower scores but larger leaf size than the third group grown under indoor grow red light, likely attributable to reduced light intensity or suboptimal nutrient levels. This study highlights the potential of indoor UV LED light farming to address challenges posed by urbanization and climate change, thereby contributing to efforts to mitigate agricultural carbon emissions and enhance food security in urban environments. This research contributes to positioning kale as a sustainable organic superfood by optimizing kale cultivation. Full article
Show Figures

Figure 1

Figure 1
<p>IoT-based kale cultivation system framework.</p>
Full article ">Figure 2
<p>Overall system architecture and workflow of the IoT-driven kale cultivation system.</p>
Full article ">Figure 3
<p>Actual system architecture and design of the IoT-driven kale cultivation system.</p>
Full article ">Figure 4
<p>Top view design of kale’s layout.</p>
Full article ">Figure 5
<p>Layout of LED light settings at various positions.</p>
Full article ">Figure 6
<p>Actual experimental setting of kale pot area: (<b>a</b>) pot experimental area; (<b>b</b>) pot watering and soil sensor.</p>
Full article ">Figure 7
<p>Actual experimental conditions and the data collection of indoor kale pots.</p>
Full article ">Figure 8
<p>Kale across different growth stages, highlighting the effectiveness of UV LED lights controlled by an IoT system.</p>
Full article ">Figure 9
<p>Comparative growth parameters of kale across different experimental groups under varying light intensities.</p>
Full article ">Figure 10
<p>The average height, leaf size, and branch size of kale grown under the top three UV light conditions.</p>
Full article ">
40 pages, 5216 KiB  
Review
Towards 6G Technology: Insights into Resource Management for Cloud RAN Deployment
by Sura F. Ismail and Dheyaa Jasim Kadhim
IoT 2024, 5(2), 409-448; https://doi.org/10.3390/iot5020020 - 14 Jun 2024
Viewed by 445
Abstract
Rapid advancements in the development of smart terminals and infrastructure, coupled with a wide range of applications with complex requirements, are creating traffic demands that current networks may not be able to fully handle. Accordingly, the study of 6G networks deserves attention from [...] Read more.
Rapid advancements in the development of smart terminals and infrastructure, coupled with a wide range of applications with complex requirements, are creating traffic demands that current networks may not be able to fully handle. Accordingly, the study of 6G networks deserves attention from both industry and academia. Artificial intelligence (AI) has emerged for application in the optimization and design process of new 6G networks. The developmental trend of 6G is towards effective resource management, along with the architectural improvement of the current network and hardware specifications. Cloud RAN (CRAN) is considered one of the major concepts in sixth- and fifth-generation wireless networks, being able to improve latency, capacity, and connectivity to huge numbers of devices. Besides bettering the current set-up in terms of setting the carriers’ network architecture and hardware specifications, among other potential enablers, the developmental trend of 6G also means that there must be effective resource management. As a result, this study covers a thorough analysis of resource management plans in CRAN, optimization, and AI taxonomy, and how AI integration might enhance existing resource management. Full article
Show Figures

Figure 1

Figure 1
<p>Services and usage scenario for 6G [<a href="#B8-IoT-05-00020" class="html-bibr">8</a>].</p>
Full article ">Figure 2
<p>Connected intellect: moving from associated publics and things [<a href="#B9-IoT-05-00020" class="html-bibr">9</a>].</p>
Full article ">Figure 3
<p>The architecture of cloud radio access network.</p>
Full article ">Figure 4
<p>The organization of this survey work.</p>
Full article ">Figure 5
<p>Taxonomy of resource management in 6G.</p>
Full article ">Figure 6
<p>Taxonomy of objectives for resource management in 6G.</p>
Full article ">Figure 7
<p>The classification of constraints of resource management in 6G.</p>
Full article ">Figure 8
<p>The key performance measures of resource management in 6G.</p>
Full article ">Figure 9
<p>The clustering process.</p>
Full article ">Figure 10
<p>Learning Types: (<b>a</b>) supervised learning, (<b>b</b>) unsupervised learning, and (<b>c</b>) reinforcement learning.</p>
Full article ">Figure 10 Cont.
<p>Learning Types: (<b>a</b>) supervised learning, (<b>b</b>) unsupervised learning, and (<b>c</b>) reinforcement learning.</p>
Full article ">Figure 11
<p>MEC implementation.</p>
Full article ">Figure 12
<p>FL in 5G and 6G networks.</p>
Full article ">Figure 13
<p>Number of articles in resource management for RAN for the recent ten years.</p>
Full article ">Figure 14
<p>Number of articles in resource management for RAN with artificial intelligent for the recent ten years.</p>
Full article ">Figure 15
<p>Number of Articles in Resource Management for CRAN for the recent ten years.</p>
Full article ">Figure 16
<p>Number of Articles in Resource Management for CRAN with Artificial Intelligent for the recent ten years.</p>
Full article ">Figure 17
<p>Number of Articles in Resource Management for RAN with respect to source of publishing.</p>
Full article ">Figure 18
<p>Number of Articles in Resource Management for CRAN with respect to source of publishing.</p>
Full article ">
28 pages, 5240 KiB  
Article
Multi-Hospital Management: Combining Vital Signs IoT Data and the Elasticity Technique to Support Healthcare 4.0
by Gabriel Souto Fischer, Gabriel de Oliveira Ramos, Cristiano André da Costa, Antonio Marcos Alberti, Dalvan Griebler, Dhananjay Singh and Rodrigo da Rosa Righi
IoT 2024, 5(2), 381-408; https://doi.org/10.3390/iot5020019 - 8 Jun 2024
Viewed by 884
Abstract
Smart cities can improve the quality of life of citizens by optimizing the utilization of resources. In an IoT-connected environment, people’s health can be constantly monitored, which can help identify medical problems before they become serious. However, overcrowded hospitals can lead to long [...] Read more.
Smart cities can improve the quality of life of citizens by optimizing the utilization of resources. In an IoT-connected environment, people’s health can be constantly monitored, which can help identify medical problems before they become serious. However, overcrowded hospitals can lead to long waiting times for patients to receive treatment. The literature presents alternatives to address this problem by adjusting care capacity to demand. However, there is still a need for a solution that can adjust human resources in multiple healthcare settings, which is the reality of cities. This work introduces HealCity, a smart-city-focused model that can monitor patients’ use of healthcare settings and adapt the allocation of health professionals to meet their needs. HealCity uses vital signs (IoT) data in prediction techniques to anticipate when the demand for a given environment will exceed its capacity and suggests actions to allocate health professionals accordingly. Additionally, we introduce the concept of multilevel proactive human resources elasticity in smart cities, thus managing human resources at different levels of a smart city. An algorithm is also devised to automatically manage and identify the appropriate hospital for a possible future patient. Furthermore, some IoT deployment considerations are presented based on a hardware implementation for the proposed model. HealCity was evaluated with four hospital settings and obtained promising results: Compared to hospitals with rigid professional allocations, it reduced waiting time for care by up to 87.62%. Full article
Show Figures

Figure 1

Figure 1
<p>Problem use-case example of a scenario where there is an inefficient static allocation of attendants in two hospitals. The level of dissatisfaction is higher in rooms that have fewer attendants available, and it is easy to see that idle attendants in a room could easily go to rooms with greater need. Additionally, we have people with health problems at home or at work who can sometimes end up heading to one of these two hospitals.</p>
Full article ">Figure 2
<p>Smart city hierarchical tree-based structure view with a focus on monitoring patients’ health parameters. People wear sensors that transmit health parameters to a fog-cloud infrastructure that provides health information directly to healthcare settings. In this structure, citizens are at the lowest level, interacting with edge devices, while hospitals are at the highest level, interacting with data already processed by the cloud infrastructure.</p>
Full article ">Figure 3
<p>Architectural components and network topology in HealCity model with a (i) web service; (ii) HealCity service for information processing and decision-making; (iii) a sensor network to capture citizens’ vital signs and locations; and (iv) hospital managers, patients and people in general, or human resources.</p>
Full article ">Figure 4
<p>HealCity Model Architecture Overview, illustrating the data trajectory beginning in the Capture module, which assimilates users’ movement data via RTLS sensors. These data are subsequently processed across various designated modules, culminating in the display of elasticity notifications within the HealCity app.</p>
Full article ">Figure 5
<p>HealCity model inputs and outputs.</p>
Full article ">Figure 6
<p>HealCity’s scalable hierarchical solution, where we can add more hospitals under any fog node and as many fog nodes as needed.</p>
Full article ">Figure 7
<p>Multilevel Proactive Elasticity of Human Resources in Smart Cities example with (i) room-level proactive elasticity, (ii) hospital-level proactive elasticity, and (iii) regional-level proactive elasticity.</p>
Full article ">Figure 8
<p>Proactive elasticity acts to anticipate the care waiting time, so the allocation and deallocation of human resources are carried out in advance prior to the achievement of predetermined thresholds.</p>
Full article ">Figure 9
<p>Regional-Level Proactive Elasticity fluxogram.</p>
Full article ">Figure 10
<p>Example of patient with altered vital signs in a smart city with three hospitals available. Even if there are hospitals closer, the most suitable for the patient is the farthest away.</p>
Full article ">Figure 11
<p>A graphical illustration of the wave workloads used in HealCity evaluation (based on Rostirolla et al. [<a href="#B54-IoT-05-00019" class="html-bibr">54</a>]).</p>
Full article ">Figure 12
<p>Maximum waiting time at the hospital for each of the proposed scenarios, S1 (in red), S2 (in orange), and S3 (in green), for (<b>a</b>) Hospital 1, (<b>b</b>) Hospital 2, (<b>c</b>) Hospital 3 and (<b>d</b>) Hospital 4, and average of maximum waiting time at (<b>e</b>) Smart City.</p>
Full article ">Figure 13
<p>Human resources cost compared with the average of maximum waiting time at the smart city in (<b>a</b>) S1 and S3 and (<b>b</b>) S2 and S3.</p>
Full article ">Figure 14
<p>Elastic number of human resources used compared with average of maximum waiting time at the smart city in S3.</p>
Full article ">Figure 15
<p>Intermec IF2 RFID reader installed in the Internet of Things and Distributed Applications laboratory of the PPGCA at Unisinos where in (<b>A</b>) the antenna was installed above the door and in (<b>B</b>) the antenna was installed next to the door.</p>
Full article ">Figure 16
<p>RFID-tags reading area around the Intermec IF2 reader antenna.</p>
Full article ">Figure 17
<p>RFID-tags front reading area of the Intermec IF2 reader antenna.</p>
Full article ">Figure 18
<p>Proposed installation of the Intermec IF2 reader antennas in two scenarios: (<b>A</b>) with a single door and (<b>B</b>) with a double door, where in both examples the doors are 2.1 m high.</p>
Full article ">
25 pages, 1661 KiB  
Article
Investigating Radio Frequency Vulnerabilities in the Internet of Things (IoT)
by Eirini Anthi, Lowri Williams, Vasilis Ieropoulos and Theodoros Spyridopoulos
IoT 2024, 5(2), 356-380; https://doi.org/10.3390/iot5020018 - 6 Jun 2024
Viewed by 1077
Abstract
With the increase in the adoption of Internet of Things (IoT) devices, the security threat they face has become more pervasive. Recent research has demonstrated that most IoT devices are insecure and vulnerable to a range of cyber attacks. The impact of such [...] Read more.
With the increase in the adoption of Internet of Things (IoT) devices, the security threat they face has become more pervasive. Recent research has demonstrated that most IoT devices are insecure and vulnerable to a range of cyber attacks. The impact of such attacks can vary significantly, from affecting the service of the device itself to putting their owners and their personal information at risk. As a response to improving their security, the focus has been on attacks, specifically on the network layer. However, the importance and impact of other vulnerabilities, such as low-level Radio Frequency (RF) attacks, have been neglected. Such attacks are challenging to detect, and they can be deployed using non-expensive equipment and can cause significant damage. This paper explores security vulnerabilities that target RF communications on popular commercial IoT devices such as Wi-Fi, Zigbee, and 433 Mz. Using software-defined radio, a range of attacks were deployed against the devices, including jamming, replay attacks, packet manipulation, protocol reverse engineering, and harmonic frequency attacks. The results demonstrated that all devices used were susceptible to jamming attacks, and in some cases, they were rendered inoperable and required a hard reset to function correctly again. This finding highlights the lack of protection against both intentional and unintentional jamming. In addition, all devices demonstrated that they were susceptible to replay attacks, which highlights the need for more hardened security measures. Finally, this paper discusses proposals for defence mechanisms for enhancing the security of IoT devices against the aforementioned attacks. Full article
Show Figures

Figure 1

Figure 1
<p>Description of the testing methodology.</p>
Full article ">Figure 2
<p>Experimental setup.</p>
Full article ">Figure 3
<p>Sparrow Wi-Fi deauthentication.</p>
Full article ">Figure 4
<p>HackRF 2.437 GHz.</p>
Full article ">Figure 5
<p>HackRF 1.2185 GHz.</p>
Full article ">Figure 6
<p>Decoded inFactory sensor data.</p>
Full article ">Figure 7
<p>Replaying the signal back using SDR angel.</p>
Full article ">Figure 8
<p>Replay attack.</p>
Full article ">Figure 9
<p>Scrambled signal.</p>
Full article ">
24 pages, 990 KiB  
Article
Adaptive Transmissions for Batteryless Periodic Sensing
by Cheng-Sheng Peng and Chao Wang
IoT 2024, 5(2), 332-355; https://doi.org/10.3390/iot5020017 - 31 May 2024
Viewed by 579
Abstract
Batteryless, self-sustaining embedded sensing devices are key enablers for scalable and long-term operations of Internet of Things (IoT) applications. While advancements in both energy harvesting and intermittent computing have helped pave the way for building such batteryless IoT devices, a present challenge is [...] Read more.
Batteryless, self-sustaining embedded sensing devices are key enablers for scalable and long-term operations of Internet of Things (IoT) applications. While advancements in both energy harvesting and intermittent computing have helped pave the way for building such batteryless IoT devices, a present challenge is a system design that can utilize intermittent energy to meet data requirements from IoT applications. In this paper, we take the requirement of periodic data sensing and describe the hardware and software of a batteryless IoT device with its model, design, implementation, and evaluation. A key finding is that, by estimating the non-linear hardware charging and discharging time, the device software can make scheduling decisions that both maintain the selected sensing period and improve transmission goodput. A hardware–software prototype was implemented using an MSP430 development board and LoRa radio communication technology. The proposed design was empirically compared with one that does not consider the non-linear hardware characteristics. The result of the experiments illustrated the nuances of the batteryless device design and implementation, and it demonstrated that the proposed design can cover a wider range of feasible sensing rates, which reduces the restriction on this parameter choice. It was further demonstrated that, under an intermittent supply of power, the proposed design could still keep the device functioning as required. Full article
Show Figures

Figure 1

Figure 1
<p>The capacitor voltage varies due to task execution. (<b>a</b>) Enough energy harvested, the ideal case; (<b>b</b>) the energy harvested is less than the energy consumed.</p>
Full article ">Figure 2
<p>The circuit model and its equivalence. (<b>a</b>) Model for a batteryless IoT device; (<b>b</b>) Thévenin equivalent circuit.</p>
Full article ">Figure 3
<p>The relationship between time on air and payload size at Spreading Factor 7, 8, and 9.</p>
Full article ">Figure 4
<p>The implementation of the batteryless IoT device.</p>
Full article ">Figure 5
<p>The required energy harvesting rate for each sensing period configuration.</p>
Full article ">Figure 6
<p>Harvester component emulation.</p>
Full article ">Figure 7
<p>Time series of capacitor voltage (60 s sensing period).</p>
Full article ">Figure 8
<p>Time series of capacitor voltage with varied sensing period. (<b>a</b>) Period = 30 s; (<b>b</b>) period = 10 s; (<b>c</b>) period = 5 s.</p>
Full article ">Figure 9
<p>Performance under intermittent energy harvesting (five-second sensing period).</p>
Full article ">Figure 10
<p>Comparison of energy consumption per useful bit.</p>
Full article ">Figure A1
<p>The sensing ratio and data delivery ratio for each sensing period.</p>
Full article ">
21 pages, 4414 KiB  
Article
Integration of IoT Technologies for Enhanced Monitoring and Control in Hybrid-Powered Desalination Systems: A Sustainable Approach to Freshwater Production
by Alaa M. Odeh and Isam Ishaq
IoT 2024, 5(2), 311-331; https://doi.org/10.3390/iot5020016 - 31 May 2024
Viewed by 646
Abstract
In the face of our rapidly expanding global population, the necessity of meeting the fundamental needs of every individual is more pressing than ever. Human survival depends upon access to water, making it a vital resource that demands novel solutions to ensure universal [...] Read more.
In the face of our rapidly expanding global population, the necessity of meeting the fundamental needs of every individual is more pressing than ever. Human survival depends upon access to water, making it a vital resource that demands novel solutions to ensure universal availability. Although our planet is abundant in water, 97.5% of it is saltwater, compelling nations to investigate ways to make it suitable for consumption. Seawater desalination is becoming increasingly vital for water sustainability. While seawater desalination offers a solution, existing methods often grapple with high energy consumption and maintaining consistent water quality. This paper proposes a novel hybrid water desalination system that addresses these limitations. Our system leverages solar energy, a readily available renewable resource, to power the desalination process, significantly improving its environmental footprint and operational efficiency. Additionally, we integrated a network of sensors and the Internet of Things (IoT) to enable the real-time monitoring of system performance and water quality. This allows for the immediate detection and improvement in any potential issues, ensuring the consistent production of clean drinking water. By combining solar energy with robust quality control via IoT, our hybrid desalination system offers a sustainable and reliable approach to meet the growing demand for freshwater. Full article
Show Figures

Figure 1

Figure 1
<p>Block diagram of the desalination system.</p>
Full article ">Figure 2
<p>The circuit schematic design of the desalination system.</p>
Full article ">Figure 3
<p>Solar energy powering circuit.</p>
Full article ">Figure 4
<p>Implemented desalination system, where a = 0.3 cm, b = 0.5 cm, c = 30 cm, and d = 18 cm. The used glass was the same glass used to cover the solar panels.</p>
Full article ">Figure 5
<p>Desalination system components: (<b>a</b>) pipes inside the tank, (<b>b</b>) openings for inserting the heater, the DS18B20 sensor, and the water level sensor, and (<b>c</b>) openings for potable water outlets and saline water inlets.</p>
Full article ">Figure 6
<p>(<b>a</b>) Things created in the Arduino IoT platform. (<b>b</b>) Things created in the Arduino IoT platform.</p>
Full article ">Figure 7
<p>Measured values on the website’s dashboard.</p>
Full article ">Figure 8
<p>System’s dashboard on the mobile IoT remote app.</p>
Full article ">Figure 9
<p>Measurements of the sensors before desalination.</p>
Full article ">Figure 10
<p>Measurements of the sensors after the desalination process was completed.</p>
Full article ">Figure 11
<p>Measured values before the desalination process.</p>
Full article ">Figure 12
<p>Measured values after the experiments.</p>
Full article ">
21 pages, 2475 KiB  
Article
Addressing Vulnerabilities in CAN-FD: An Exploration and Security Enhancement Approach
by Naseeruddin Lodge, Nahush Tambe and Fareena Saqib
IoT 2024, 5(2), 290-310; https://doi.org/10.3390/iot5020015 - 30 May 2024
Viewed by 469
Abstract
The rapid advancement of technology, alongside state-of-the-art techniques is at an all-time high. However, this unprecedented growth of technological prowess also brings forth potential threats, as oftentimes the security encompassing these technologies is imperfect. Particularly within the automobile industry, the recent strides in [...] Read more.
The rapid advancement of technology, alongside state-of-the-art techniques is at an all-time high. However, this unprecedented growth of technological prowess also brings forth potential threats, as oftentimes the security encompassing these technologies is imperfect. Particularly within the automobile industry, the recent strides in technology have brought about increased complexity. A notable flaw lies in the CAN-FD protocol, which lacks robust security measures, making it vulnerable to data theft, injection, replay, and flood data attacks. With the rising complexity of in-vehicular networks and the widespread adoption of CAN-FD, the imperative to safeguard the protocol has never been more crucial. This paper aims to provide a comprehensive review of the existing in-vehicle communication protocol, CAN-FD. It explores existing security approaches designed to fortify CAN-FD, demonstrating multiple multi-layer solutions that leverage modern techniques including Physical Unclonable Function (PUF), Elliptical Curve Cryptography (ECC), Ethereum Blockchain, and Smart contracts. The paper highlights existing multi-layer security measures that offer minimal overhead, optimal performance, and robust security. Moreover, it identifies areas where these security measures fall short and discusses ongoing research along with suggestions for implementing software and hardware-level modifications. These proposed changes aim to streamline complexity, reduce overhead while ensuring forward compatibility. In essence, the methods outlined in this study are poised to excel in real-world applications, offering robust protection for the evolving landscape of in-vehicular communication systems. Full article
(This article belongs to the Special Issue Cloud and Edge Computing Systems for IoT)
Show Figures

Figure 1

Figure 1
<p>CAN vs. CAN-FD Dataframes [<a href="#B6-IoT-05-00015" class="html-bibr">6</a>].</p>
Full article ">Figure 2
<p>Comparison of Message Size with Varying Payload for CAN vs. CAN-FD [<a href="#B8-IoT-05-00015" class="html-bibr">8</a>].</p>
Full article ">Figure 3
<p>Comparison of Message Overhead with Varying Payload for CAN vs. CAN-FD [<a href="#B8-IoT-05-00015" class="html-bibr">8</a>].</p>
Full article ">Figure 4
<p>Secure Block Implementation at Each Client Node [<a href="#B1-IoT-05-00015" class="html-bibr">1</a>].</p>
Full article ">Figure 5
<p>Sender Preparing to send the encrypted message along with MAC Tag and sender public key to help receiver decrypt the message.</p>
Full article ">Figure 6
<p>Decrypting a Message from the Sender.</p>
Full article ">Figure 7
<p>CAN-FD Blockchain Integration Architecture [<a href="#B6-IoT-05-00015" class="html-bibr">6</a>].</p>
Full article ">Figure 8
<p>CAN-FD Communication via Blockchain [<a href="#B6-IoT-05-00015" class="html-bibr">6</a>].</p>
Full article ">
19 pages, 8269 KiB  
Article
Development, Implementation and Evaluation of An Epidemic Communication System
by Naoki Yamada, Takefumi Hiraguri, Tomotaka Kimura, Hiroyuki Shimizu, Yoshihiro Takemura and Takahiro Matsuda
IoT 2024, 5(2), 271-289; https://doi.org/10.3390/iot5020014 - 24 May 2024
Viewed by 894
Abstract
The purpose of this study is to discuss epidemic communication for drones to share information in flight and to develop a wireless system for implementation. Various theoretical studies have been conducted on epidemic communication, but their applications are not clear, so a system [...] Read more.
The purpose of this study is to discuss epidemic communication for drones to share information in flight and to develop a wireless system for implementation. Various theoretical studies have been conducted on epidemic communication, but their applications are not clear, so a system that assumes practical use is developed. As the main evaluation items, we analyzed the effect of communication interference between drones on the amount of data transmission, and furthermore, proposed an optimal transmission method depending on the flight speed. In these analysis results, we designed functions to be implemented in drones, developed wireless devices, and confirmed their operation through demonstration tests using actual drones. Based on the results of this research, we succeeded in identifying issues to be addressed in order to implement the system on drones and in developing an epidemic communication system based on the results of demonstration experiments, thereby contributing to the realization of inter-drone communication in the future. Full article
Show Figures

Figure 1

Figure 1
<p>Examples of autonomous networks with robots.</p>
Full article ">Figure 2
<p>Example of epidemic communication in action.</p>
Full article ">Figure 3
<p>Models for using epidemic communication.</p>
Full article ">Figure 4
<p>Example of simultaneous relay transmissions.</p>
Full article ">Figure 5
<p>Interference wave model for desired wave.</p>
Full article ">Figure 6
<p>SINR and transmission rate evaluation.</p>
Full article ">Figure 7
<p>Connection and transmission behavior within the communication range.</p>
Full article ">Figure 8
<p>Sequence of connection and data transmission procedures.</p>
Full article ">Figure 9
<p>Model for calculating transferable data volume.</p>
Full article ">Figure 10
<p>Average amount of data that can be transferred relative to the distance of the interfering station.</p>
Full article ">Figure 11
<p>Connection and disconnection control flowchart.</p>
Full article ">Figure 12
<p>Configuration of the developed wireless system.</p>
Full article ">Figure 13
<p>Configured protocol stacks including the bundle layer and the socket function.</p>
Full article ">Figure 14
<p>Procedure for data-transfer processing using a socket function.</p>
Full article ">Figure 15
<p>Evaluation of data reception based on the experiment.</p>
Full article ">Figure 16
<p>Setup of the demonstration experiment.</p>
Full article ">
21 pages, 2334 KiB  
Article
Smart Agriculture Drone for Crop Spraying Using Image-Processing and Machine Learning Techniques: Experimental Validation
by Edward Singh, Aashutosh Pratap, Utkal Mehta and Sheikh Izzal Azid
IoT 2024, 5(2), 250-270; https://doi.org/10.3390/iot5020013 - 22 May 2024
Viewed by 1701
Abstract
Smart agricultural drones for crop spraying are becoming popular worldwide. Research institutions, commercial companies, and government agencies are investigating and promoting the use of technologies in the agricultural industry. This study presents a smart agriculture drone integrated with Internet of Things technologies that [...] Read more.
Smart agricultural drones for crop spraying are becoming popular worldwide. Research institutions, commercial companies, and government agencies are investigating and promoting the use of technologies in the agricultural industry. This study presents a smart agriculture drone integrated with Internet of Things technologies that use machine learning techniques such as TensorFlow Lite with an EfficientDetLite1 model to identify objects from a custom dataset trained on three crop classes, namely, pineapple, papaya, and cabbage species, achieving an inference time of 91 ms. The system’s operation is characterised by its adaptability, offering two spray modes, with spray modes A and B corresponding to a 100% spray capacity and a 50% spray capacity based on real-time data, embodying the potential of Internet of Things for real-time monitoring and autonomous decision-making. The drone is operated with an X500 development kit and has a payload of 1.5 kg with a flight time of 25 min, travelling at a velocity of 7.5 m/s at a height of 2.5 m. The drone system aims to improve sustainable farming practices by optimising pesticide application and improving crop health monitoring. Full article
Show Figures

Figure 1

Figure 1
<p>Methodology showing (<b>a</b>) image-processing system, (<b>b</b>) crop-spraying system, (<b>c</b>) drone flight system.</p>
Full article ">Figure 2
<p>Sample images from custom dataset.</p>
Full article ">Figure 3
<p>Image processing system.</p>
Full article ">Figure 4
<p>Crop-spraying system.</p>
Full article ">Figure 5
<p>Hardware setup of X500 development kit.</p>
Full article ">Figure 6
<p>Closed-loop control system.</p>
Full article ">Figure 7
<p>Drone system and ground station.</p>
Full article ">Figure 8
<p>Object detection at an altitude of 2.5 m with Pi Camera.</p>
Full article ">Figure 9
<p>Comparing spray width in modes A and B.</p>
Full article ">Figure 10
<p>Comparing spray flow rate in modes A and B.</p>
Full article ">Figure 11
<p>Spray coefficient of variation vs. height.</p>
Full article ">Figure 12
<p>Mission Planner waypoint interface over simulated agricultural fields.</p>
Full article ">Figure 13
<p>Plant matrix setup.</p>
Full article ">Figure 14
<p>GPS flight log.</p>
Full article ">Figure 15
<p>Drone setup.</p>
Full article ">Figure 16
<p>Drone at the test site with a remote terminal message and detection at height 2.5 m.</p>
Full article ">
23 pages, 1384 KiB  
Article
FedMon: A Federated Learning Monitoring Toolkit
by Moysis Symeonides, Demetris Trihinas and Fotis Nikolaidis
IoT 2024, 5(2), 227-249; https://doi.org/10.3390/iot5020012 - 11 Apr 2024
Viewed by 1578
Abstract
Federated learning (FL) is rapidly shaping into a key enabler for large-scale Artificial Intelligence (AI) where models are trained in a distributed fashion by several clients without sharing local and possibly sensitive data. For edge computing, sharing the computational load across multiple clients [...] Read more.
Federated learning (FL) is rapidly shaping into a key enabler for large-scale Artificial Intelligence (AI) where models are trained in a distributed fashion by several clients without sharing local and possibly sensitive data. For edge computing, sharing the computational load across multiple clients is ideal, especially when the underlying IoT and edge nodes encompass limited resource capacity. Despite its wide applicability, monitoring FL deployments comes with significant challenges. AI practitioners are required to invest a vast amount of time (and labor) in manually configuring state-of-the-art monitoring tools. This entails addressing the unique characteristics of the FL training process, including the extraction of FL-specific and system-level metrics, aligning metrics to training rounds, pinpointing performance inefficiencies, and comparing current to previous deployments. This work introduces FedMon, a toolkit designed to ease the burden of monitoring FL deployments by seamlessly integrating the probing interface with the FL deployment, automating the metric extraction, providing a rich set of system, dataset, model, and experiment-level metrics, and providing the analytic means to assess trade-offs and compare different model and training configurations. Full article
(This article belongs to the Special Issue Cloud and Edge Computing Systems for IoT)
Show Figures

Figure 1

Figure 1
<p>High-level overview of federated learning employing the FedAvg algorithm. At first, a global model <math display="inline"><semantics> <msub> <mi mathvariant="bold">W</mi> <msub> <mi>t</mi> <mn>0</mn> </msub> </msub> </semantics></math> is prepared by the server (step 1) and disseminated to the clients selected for the first training round <math display="inline"><semantics> <msub> <mi>t</mi> <mn>0</mn> </msub> </semantics></math> (step 2), the clients update their local model state at <math display="inline"><semantics> <msub> <mi>t</mi> <mn>1</mn> </msub> </semantics></math> (step 3), and, afterward, the central FL server employs a weighted mean to infer a new global model state <math display="inline"><semantics> <msub> <mi mathvariant="bold">W</mi> <msub> <mi>t</mi> <mn>1</mn> </msub> </msub> </semantics></math> (step 4). This process is repeated for a number of rounds or until convergence to a certain model loss.</p>
Full article ">Figure 2
<p>Multiple levels of monitoring instrumentation are required for federated learning.</p>
Full article ">Figure 3
<p>FedMon framework overview.</p>
Full article ">Figure 4
<p>Snippet of FedMonClient and Profiler.</p>
Full article ">Figure 5
<p>Accuracy (<b>left</b>) and loss (<b>right</b>) of the global model at the i-th round after the aggregation has been applied (e.g., weighted mean for FedAvg) with the evaluation/testing extracted from the underlying FL engine.</p>
Full article ">Figure 6
<p>FL training and testing duration in seconds per round.</p>
Full article ">Figure 7
<p>Average CPU time (left y-axis and red line) and the sum of network I/O in megabytes (MB) (right y-axis and blue line) from all FL clients for rounds 22–27.</p>
Full article ">Figure 8
<p>Average CPU time (left y-axis and red line) and the sum of network I/O in megabytes (MB) (right y-axis and blue line) for each FL client within round 25.</p>
Full article ">Figure 9
<p>Summary of utilization metrics for FL trials.</p>
Full article ">Figure 10
<p>Summary of FL-related metrics for FL trials.</p>
Full article ">Figure 11
<p>Correlation metrics for each trial.</p>
Full article ">Figure 12
<p>Comparison of Diverse metrics of FL Trials.</p>
Full article ">Figure 13
<p>Per-round duration in seconds and overall network traffic in megabytes (MB).</p>
Full article ">Figure 14
<p>Resource utilization for heterogeneous and homogeneous data distribution.</p>
Full article ">Figure 15
<p>FL duration metrics for heterogeneous and homogeneous data distribution.</p>
Full article ">
15 pages, 1126 KiB  
Article
Enhancing Automatic Modulation Recognition for IoT Applications Using Transformers
by Narges Rashvand, Kenneth Witham, Gabriel Maldonado, Vinit Katariya, Nishanth Marer Prabhu, Gunar Schirner and Hamed Tabkhi
IoT 2024, 5(2), 212-226; https://doi.org/10.3390/iot5020011 - 9 Apr 2024
Cited by 1 | Viewed by 1463
Abstract
Automatic modulation recognition (AMR) is vital for accurately identifying modulation types within incoming signals, a critical task for optimizing operations within edge devices in IoT ecosystems. This paper presents an innovative approach that leverages Transformer networks, initially designed for natural language processing, to [...] Read more.
Automatic modulation recognition (AMR) is vital for accurately identifying modulation types within incoming signals, a critical task for optimizing operations within edge devices in IoT ecosystems. This paper presents an innovative approach that leverages Transformer networks, initially designed for natural language processing, to address the challenges of efficient AMR. Our Transformer network architecture is designed with the mindset of real-time edge computing on IoT devices. Four tokenization techniques are proposed and explored for creating proper embeddings of RF signals, specifically focusing on overcoming the limitations related to the model size often encountered in IoT scenarios. Extensive experiments reveal that our proposed method outperformed advanced deep learning techniques, achieving the highest recognition accuracy. Notably, our model achieved an accuracy of 65.75 on the RML2016 and 65.80 on the CSPB.ML.2018+ dataset. Full article
(This article belongs to the Special Issue Cloud and Edge Computing Systems for IoT)
Show Figures

Figure 1

Figure 1
<p>The overall architecture of our proposed Transformer-based model for the AMR task includes three main components: a tokenization module that converts the signal into tokens, a Transformer-encoder module, which captures information and extracts relevant features through self-attention mechanism, and a classifier module for the final classification step.</p>
Full article ">Figure 2
<p>TransDirect architecture. In the tokenization module of this architecture, <span class="html-italic">IQ</span> samples are segmented into shorter sequences referred to as tokens, each having a size of <span class="html-italic">l</span>.</p>
Full article ">Figure 3
<p>Tokenization module of TransDirect-Overlapping architecture, which divides <span class="html-italic">IQ</span> samples into tokens, each with a length <span class="html-italic">l</span>, where each token overlaps the preceding one by <math display="inline"><semantics> <mrow> <mi>l</mi> <mo>/</mo> <mn>2</mn> </mrow> </semantics></math>.</p>
Full article ">Figure 4
<p>TransIQ architecture. In the tokenization module of this architecture, the input signal is segmented into tokens. Each token then undergoes one-dimensional convolutional before being processed by the Transformer-encoder module.</p>
Full article ">Figure 5
<p>Modulation-recognition accuracy comparison between the two variants of TransIQ and other baseline models on the CSPB.ML.2018+ dataset with a change in the SNR, where the SNR ranged from −19 dB to +20 dB.</p>
Full article ">Figure 6
<p>Confusion matrix for ResNet versus proposed models (TransIQ-large variant and TransIQ-small variant) on CSPB.ML.2018+ dataset. Each row represents the actual class, and each column corresponds to the class as predicted by the mentioned models.</p>
Full article ">
25 pages, 9966 KiB  
Article
Development of a Multi-Radio Device for Dry Container Monitoring and Tracking
by Mariano Falcitelli, Misal, Sandro Noto and Paolo Pagano
IoT 2024, 5(2), 187-211; https://doi.org/10.3390/iot5020010 - 2 Apr 2024
Viewed by 1203
Abstract
Maritime shipping companies have identified continuous tracking of intermodal containers as a key tool for increasing shipment reliability and generating important economies of scale. Equipping all dry containers with an Internet-connected tracking device is a need in the global shipping market that is [...] Read more.
Maritime shipping companies have identified continuous tracking of intermodal containers as a key tool for increasing shipment reliability and generating important economies of scale. Equipping all dry containers with an Internet-connected tracking device is a need in the global shipping market that is still waiting to be met. This paper presents the methods and tools to build and test a prototype of a Container Tracking Device (CTD) that integrates NB-IoT, BLE Mesh telecommunication and low-power consumption technologies for the massive deployment of the IoT. The work was carried out as part of a project to build the so-called “5G Global Tracking System”, enabling several different logistic applications relying on massive IoT, M2M standard platforms, as well as satellite networks to collect data from dry containers when the vessel is in open sea. Starting from a preliminary phase, in which state-of-the-art technologies, research approaches, industrial initiatives and developing standards were investigated, a prototype version of the CTD has been designed, verified and developed as the first fundamental step for subsequent industrial engineering. The results of specific tests are shown: after verifying that the firmware is capable of handling the various functions of the device, a special focus is devoted to the power consumption measurements of the CTD to size the battery pack. Full article
Show Figures

Figure 1

Figure 1
<p>A 5GT system data flow based on different scenarios.</p>
Full article ">Figure 2
<p>Global IoT cellular coverage map of the GSM Association [<a href="#B24-IoT-05-00010" class="html-bibr">24</a>].</p>
Full article ">Figure 3
<p>Representation of CTDs on the ship: devices at the top of the container stack perform as the NB-IoT/BLE Mesh Gateway, and those below are nodes of BLE Meshes.</p>
Full article ">Figure 4
<p>The architecture of CTD as GW between the BLE Mesh and the NB-IoT cellular networks.</p>
Full article ">Figure 5
<p>The purchased Nordic Thingy:91 prototyping platform [<a href="#B31-IoT-05-00010" class="html-bibr">31</a>].</p>
Full article ">Figure 6
<p>The purchased ESP32 prototyping platform (<b>left</b>), with Quectel BG95 shield (<b>right</b>).</p>
Full article ">Figure 7
<p>CTD block diagram.</p>
Full article ">Figure 8
<p>Flowchart of the algorithm instantiated for CTD’s communications.</p>
Full article ">Figure 9
<p>CTD Proof-of-Concept setup [<a href="#B36-IoT-05-00010" class="html-bibr">36</a>].</p>
Full article ">Figure 10
<p>Dashboard of the ICON OneM2M compliant platform.</p>
Full article ">Figure 11
<p>Data published to the ICON OneM2M-compliant platform.</p>
Full article ">Figure 12
<p>Monitoring console of the devices [<a href="#B36-IoT-05-00010" class="html-bibr">36</a>].</p>
Full article ">Figure 13
<p>Provisioning of BLE Mesh server nodes by the client [<a href="#B36-IoT-05-00010" class="html-bibr">36</a>].</p>
Full article ">Figure 14
<p>Console output showing data produced by a BLE server mesh node [<a href="#B36-IoT-05-00010" class="html-bibr">36</a>].</p>
Full article ">Figure 15
<p>Data published to the ICON platform from a BLE server mesh node [<a href="#B36-IoT-05-00010" class="html-bibr">36</a>].</p>
Full article ">Figure 16
<p>Power consumption measurement setup [<a href="#B36-IoT-05-00010" class="html-bibr">36</a>].</p>
Full article ">Figure 17
<p>Current consumption with NB-IoT, BLE Mesh, sensors and GPS turned on [<a href="#B36-IoT-05-00010" class="html-bibr">36</a>].</p>
Full article ">Figure 18
<p>Current consumption without sensors ESP32 in active mode with BLE turned on, transmitting periodical beacons [<a href="#B36-IoT-05-00010" class="html-bibr">36</a>].</p>
Full article ">Figure 19
<p>Current consumption during BLE Mesh usage [<a href="#B36-IoT-05-00010" class="html-bibr">36</a>].</p>
Full article ">
Previous Issue
Next Issue
Back to TopTop