[go: up one dir, main page]

 
 
sensors-logo

Journal Browser

Journal Browser

Selected Papers from the Global IoT Summit GIoTS 2020

A special issue of Sensors (ISSN 1424-8220). This special issue belongs to the section "Internet of Things".

Deadline for manuscript submissions: closed (15 February 2021) | Viewed by 52408

Special Issue Editors


E-Mail Website
Guest Editor

E-Mail Website
Guest Editor
Department of Business Development and Technology, Aarhus University, Birk Centerpark 15, building 8001, Innovatorium, CBD 7400 Herning, Denmark
Interests: IoT; Industry 4.0; Business Model Innovation; Smart Cities; Urban Manufacturing
Special Issues, Collections and Topics in MDPI journals

E-Mail Website
Guest Editor
Mandat International, International Cooperation Foundation and IoT Lab, 3 ch. du Champ-Baron, 1209 Geneva, Switzerland
Special Issues, Collections and Topics in MDPI journals

E-Mail Website
Guest Editor
DunavNET d.o.o., A. Čehova 1, 21000 Novi Sad, Serbia
Interests: IoT; smart agriculture/cities/manufacturing; digital transformations; business models
Special Issues, Collections and Topics in MDPI journals

E-Mail Website
Guest Editor
EURECOM, Campus SophiaTech, 450 route des Chappes, Biot 06410, France

E-Mail Website
Guest Editor
University of Luxembourg, Maison du Nombre, 6, avenue de la Fonte, L-4364 Esch-sur-Alzette, Luxembourg
Interests: IPv6; IoT; 5G
Special Issues, Collections and Topics in MDPI journals

Special Issue Information

Dear Colleagues,

The 2020 Global IoT Summit (GIoTS) http://www.globaliotsummit.org/ seeks contributions on how to nurture and cultivate IoT technologies and applications for the benefit of society.

The aim of this Special Issue is to include selected papers from the 2020 Global IoT Summit (GIoTS) describing researchers from both academia and industry and technical presentations on the recent advances in theory, application, and implementation of the Internet of Things concepts and IoT technologies and applications. Papers should be original and should emphasize current topics relevant to the IoT community on the latest research, engineering, standards, and business issues.

Prof. Dr. Antonio Fernando Skarmeta Gómez
Prof. Dr. Mirko Presser
Dr. Sébastien Ziegler
Prof. Dr. Srdjan Krčo
Mr. Soumya Kanti Datta
Mr. Latif Ladid
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Sensors is an international peer-reviewed open access semimonthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2600 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • IoT Enabling Technologies
  • IoT Applications, Services and Real Implementations
  • IoT Multimedia, Societal Impacts and Sustainable Development
  • Security and Privacy for Internet of Things

Benefits of Publishing in a Special Issue

  • Ease of navigation: Grouping papers by topic helps scholars navigate broad scope journals more efficiently.
  • Greater discoverability: Special Issues support the reach and impact of scientific research. Articles in Special Issues are more discoverable and cited more frequently.
  • Expansion of research network: Special Issues facilitate connections among authors, fostering scientific collaborations.
  • External promotion: Articles in Special Issues are often promoted through the journal's social media, increasing their visibility.
  • e-Book format: Special Issues with more than 10 articles can be published as dedicated e-books, ensuring wide and rapid dissemination.

Further information on MDPI's Special Issue policies can be found here.

Published Papers (10 papers)

Order results
Result details
Select all
Export citation of selected articles as:

Research

Jump to: Review

27 pages, 6767 KiB  
Article
Climate-Aware and IoT-Enabled Selection of the Most Suitable Stone Fruit Tree Variety
by Juan A. López-Morales, Juan A. Martínez, Manuel Caro, Manuel Erena and Antonio F. Skarmeta
Sensors 2021, 21(11), 3867; https://doi.org/10.3390/s21113867 - 3 Jun 2021
Cited by 7 | Viewed by 3858
Abstract
The application of new technologies such as the Internet of Things offers the opportunity to improve current agricultural development, facilitate daily tasks, and turn farms into efficient and sustainable production systems. The use of these new technologies enables the digital transformation process demanded [...] Read more.
The application of new technologies such as the Internet of Things offers the opportunity to improve current agricultural development, facilitate daily tasks, and turn farms into efficient and sustainable production systems. The use of these new technologies enables the digital transformation process demanded by the sector and provides agricultural collectives with more optimized analysis and prediction tools. Due to climate change, one of the farm industry’s problems is the advance or decay in the cycle of stone fruit trees. The objective is to recommend whether a specific area meets the minimum climatic requirements for planting certain stone fruit trees based on climatic data and bioclimatic indicators. The methodology used implements a large amount of meteorological data to generate information on specific climatic conditions and interactions on crops. In this work, a pilot study has been carried out in the Region of Murcia using an IoT platform. We simulate scenarios for the development of stone fruit varieties better adapted to the environment. Based on the standard, open interfaces, and protocols, the platform integrates heterogeneous information sources and interoperability with other third-party solutions to exchange and exploit such information. Full article
(This article belongs to the Special Issue Selected Papers from the Global IoT Summit GIoTS 2020)
Show Figures

Figure 1

Figure 1
<p>Data sets used and expected results.</p>
Full article ">Figure 2
<p>Diagram of the architecture.</p>
Full article ">Figure 3
<p>The scheme followed for the implementation of the proposed architecture.</p>
Full article ">Figure 4
<p>Controller registration module on the platform.</p>
Full article ">Figure 5
<p>Ombrothermal diagrams for the five determined homoclimatic zones.</p>
Full article ">Figure 6
<p>Climatic classification of stone fruit tree growing areas in Spain.</p>
Full article ">Figure 7
<p>Climatic classification of the stone fruit tree producing areas in the Murcia Region.</p>
Full article ">Figure 8
<p>Data sets used and expected results.</p>
Full article ">Figure 9
<p>Representation of the Cold Units in the most representative weeks for the climatic zones of the Murcia Region.</p>
Full article ">Figure 10
<p>Representation of Portions in the most representative weeks for the climatic zones of the Murcia Region.</p>
Full article ">Figure 11
<p>Representation of different soil moisture levels in a peach plot to monitor water stress.</p>
Full article ">Figure 12
<p>Use of vegetation (NDVI) and water (NDWI) indexes for satellite monitoring of crop condition.</p>
Full article ">Figure 13
<p>Geographic viewer showing the recommendation for planting varietal groups in an area.</p>
Full article ">Figure 14
<p>Geographic viewer that shows the evolution of the variables (current and historical) in the area.</p>
Full article ">Figure 15
Full article ">Figure 16
Full article ">Figure 17
Full article ">
27 pages, 2985 KiB  
Article
PyFF: A Fog-Based Flexible Architecture for Enabling Privacy-by-Design IoT-Based Communal Smart Environments
by Fatima Zohra Benhamida, Joan Navarro, Oihane Gómez-Carmona, Diego Casado-Mansilla, Diego López-de-Ipiña and Agustín Zaballos
Sensors 2021, 21(11), 3640; https://doi.org/10.3390/s21113640 - 24 May 2021
Cited by 6 | Viewed by 3367
Abstract
The advent of the Internet of Things (IoT) and the massive growth of devices connected to the Internet are reshaping modern societies. However, human lifestyles are not evolving at the same pace as technology, which often derives into users’ reluctance and aversion. Although [...] Read more.
The advent of the Internet of Things (IoT) and the massive growth of devices connected to the Internet are reshaping modern societies. However, human lifestyles are not evolving at the same pace as technology, which often derives into users’ reluctance and aversion. Although it is essential to consider user involvement/privacy while deploying IoT devices in a human-centric environment, current IoT architecture standards tend to neglect the degree of trust that humans require to adopt these technologies on a daily basis. In this regard, this paper proposes an architecture to enable privacy-by-design with human-in-the-loop IoT environments. In this regard, it first distills two IoT use-cases with high human interaction to analyze the interactions between human beings and IoT devices in an environment which had not previously been subject to the Internet of People principles.. Leveraging the lessons learned in these use-cases, the Privacy-enabling Fog-based and Flexible (PyFF) human-centric and human-aware architecture is proposed which brings together distributed and intelligent systems are brought together. PyFF aims to maintain end-users’ privacy by involving them in the whole data lifecycle, allowing them to decide which information can be monitored, where it can be computed and the appropriate feedback channels in accordance with human-in-the-loop principles. Full article
(This article belongs to the Special Issue Selected Papers from the Global IoT Summit GIoTS 2020)
Show Figures

Figure 1

Figure 1
<p>The energy consumption data flow from the Ethernet-based Arduino microcontroller board to the remote server where the data were stored for later processing and analysis [<a href="#B26-sensors-21-03640" class="html-bibr">26</a>].</p>
Full article ">Figure 2
<p>System architecture of the Coffee Machine use-case [<a href="#B26-sensors-21-03640" class="html-bibr">26</a>].</p>
Full article ">Figure 3
<p>GreenSoul Reference Architecture [<a href="#B28-sensors-21-03640" class="html-bibr">28</a>].</p>
Full article ">Figure 4
<p>The GreenSoul Persuasion Treatments with the associated technology to deliver them (post-its, mobile app, physical devices and all the treatments together) [<a href="#B28-sensors-21-03640" class="html-bibr">28</a>].</p>
Full article ">Figure 5
<p>The proposed PyFF system architecture.</p>
Full article ">Figure 6
<p>Abstraction of the PyFF architecture to address energy efficiency and user comfort in a smart workplace environment.</p>
Full article ">Figure 7
<p>Implementation of the PyFF architecture in a smart workplace.</p>
Full article ">
18 pages, 2494 KiB  
Article
Smart SDN Management of Fog Services to Optimize QoS and Energy
by Piotr Fröhlich, Erol Gelenbe, Jerzy Fiołka, Jacek Chęciński, Mateusz Nowak and Zdzisław Filus
Sensors 2021, 21(9), 3105; https://doi.org/10.3390/s21093105 - 29 Apr 2021
Cited by 13 | Viewed by 3052
Abstract
The short latency required by IoT devices that need to access specific services have led to the development of Fog architectures that can serve as a useful intermediary between IoT systems and the Cloud. However, the massive numbers of IoT devices that are [...] Read more.
The short latency required by IoT devices that need to access specific services have led to the development of Fog architectures that can serve as a useful intermediary between IoT systems and the Cloud. However, the massive numbers of IoT devices that are being deployed raise concerns about the power consumption of such systems as the number of IoT devices and Fog servers increase. Thus, in this paper, we describe a software-defined network (SDN)-based control scheme for client–server interaction that constantly measures ongoing client–server response times and estimates network power consumption, in order to select connection paths that minimize a composite goal function, including both QoS and power consumption. The approach using reinforcement learning with neural networks has been implemented in a test-bed and is detailed in this paper. Experiments are presented that show the effectiveness of our proposed system in the presence of a time-varying workload of client-to-service requests, resulting in a reduction of power consumption of approximately 15% for an average response time increase of under 2%. Full article
(This article belongs to the Special Issue Selected Papers from the Global IoT Summit GIoTS 2020)
Show Figures

Figure 1

Figure 1
<p>Measurement apparatus, based on the Hall effect, for power versus traffic characteristics of NUC hardware used for each SDN switch.</p>
Full article ">Figure 2
<p>The dependence of the instantaneous power consumption on the traffic load of an Intel NUC that is used as a SDN switch or router. The <span class="html-italic">y</span> axis is the power consumption in Watts, averaged over 30 distinct measurements, against the traffic values provided in the <span class="html-italic">x</span> axis in Mb/s.</p>
Full article ">Figure 3
<p>The increment in the amount of energy in <span class="html-italic">Joules per Mb</span> transported through a NUC acting as a SDN switch (shown on the <span class="html-italic">y</span> axis), as a function of the ongoing traffic rate in Mb/s passing through the NUC (shown on the <span class="html-italic">x</span> axis). This curve shows that if we operate the NUC at the left-hand side of the peak of the curve, increasing the traffic will also increase the energy per unit traffic, while if the NUC is operated at the right-hand side of the peak, then as we add on more traffic through the NUC, the energy per Mb actually decreases.</p>
Full article ">Figure 4
<p>The architecture that we used for the experiments is shown, including the clients and services (resident on servers), plus the SDN network with a SDN controller and 5 SDN switches (the round blue objects) with 8 links between the switches. All the SDN switches are implemented on Intel NUCs. Two switches support the connections to services, while two other switches support the connections to the clients.</p>
Full article ">Figure 5
<p>The average response time experienced by all clients for the services, measured over some 1000 s, averaged over five distinct experiments with identical parameters.</p>
Full article ">Figure 6
<p>Individual variations in the average response time observed for each of the five distinct experiments with identical parameters.</p>
Full article ">Figure 7
<p>Instantaneous power consumption in the SDN switch part of the network, measured as a function of the clients’ data throughput towards the servers which are supporting the services. The power value is deduced from traffic measurements and from the power versus traffic data in <a href="#sensors-21-03105-f002" class="html-fig">Figure 2</a>. We see that when the RL controller takes power into account, a power savings of the order of 15% occurs.</p>
Full article ">Figure 8
<p>We observe the very significant stability of the average response time of the system over a long period of 500 s, when either QoS optimization is, or QoS and energy optimization are conducted by the RL-based control algorithm. This illustrates the ability of the RL control to react to changes in load represented by ongoing requests by the clients to the services, maintaining the average response time at a low level. We see that the reduction in power consumption observed in <a href="#sensors-21-03105-f007" class="html-fig">Figure 7</a> comes at an increase of less than 2% (5 parts in 250) in the average response time.</p>
Full article ">Figure 9
<p>Measured relative frequency with which the optimization algorithm chooses the different network paths in <a href="#sensors-21-03105-f004" class="html-fig">Figure 4</a>.</p>
Full article ">
17 pages, 1189 KiB  
Article
Automated IoT Device Identification Based on Full Packet Information Using Real-Time Network Traffic
by Narges Yousefnezhad, Avleen Malhi and Kary Främling
Sensors 2021, 21(8), 2660; https://doi.org/10.3390/s21082660 - 10 Apr 2021
Cited by 30 | Viewed by 8056
Abstract
In an Internet of Things (IoT) environment, a large volume of potentially confidential data might be leaked from sensors installed everywhere. To ensure the authenticity of such sensitive data, it is important to initially verify the source of data and its identity. Practically, [...] Read more.
In an Internet of Things (IoT) environment, a large volume of potentially confidential data might be leaked from sensors installed everywhere. To ensure the authenticity of such sensitive data, it is important to initially verify the source of data and its identity. Practically, IoT device identification is the primary step toward a secure IoT system. An appropriate device identification approach can counteract malicious activities such as sending false data that trigger irreparable security issues in vital or emergency situations. Recent research indicates that primary identity metrics such as Internet Protocol (IP) or Media Access Control (MAC) addresses are insufficient due to their instability or easy accessibility. Thus, to identify an IoT device, analysis of the header information of packets by the sensors is of imperative consideration. This paper proposes a combination of sensor measurement and statistical feature sets in addition to a header feature set using a classification-based device identification framework. Various machine Learning algorithms have been adopted to identify different combinations of these feature sets to provide enhanced security in IoT devices. The proposed method has been evaluated through normal and under-attack circumstances by collecting real-time data from IoT devices connected in a lab setting to show the system robustness. Full article
(This article belongs to the Special Issue Selected Papers from the Global IoT Summit GIoTS 2020)
Show Figures

Figure 1

Figure 1
<p>Identification in Internet of Things (IoT).</p>
Full article ">Figure 2
<p>IoT device identification framework.</p>
Full article ">Figure 3
<p>Implementation steps.</p>
Full article ">Figure 4
<p>Object emulation attack and Botnet attack model in IoT.</p>
Full article ">Figure 5
<p>Experimental setup for data collection.</p>
Full article ">Figure 6
<p>False Positive (FP) rate for attack scenario 1 for all the profiling models.</p>
Full article ">Figure 7
<p>FP rate for attack scenario 2 for all the profiling models.</p>
Full article ">Figure 8
<p>FP rate for attack scenario 1 (s1) and scenario 2 (s2).</p>
Full article ">
17 pages, 2580 KiB  
Article
Secure LoRa Firmware Update with Adaptive Data Rate Techniques
by Derek Heeger, Maeve Garigan, Eirini Eleni Tsiropoulou and Jim Plusquellic
Sensors 2021, 21(7), 2384; https://doi.org/10.3390/s21072384 - 30 Mar 2021
Cited by 17 | Viewed by 3667
Abstract
Internet of Things (IoT) devices rely upon remote firmware updates to fix bugs, update embedded algorithms, and make security enhancements. Remote firmware updates are a significant burden to wireless IoT devices that operate using low-power wide-area network (LPWAN) technologies due to slow data [...] Read more.
Internet of Things (IoT) devices rely upon remote firmware updates to fix bugs, update embedded algorithms, and make security enhancements. Remote firmware updates are a significant burden to wireless IoT devices that operate using low-power wide-area network (LPWAN) technologies due to slow data rates. One LPWAN technology, Long Range (LoRa), has the ability to increase the data rate at the expense of range and noise immunity. The optimization of communications for maximum speed is known as adaptive data rate (ADR) techniques, which can be applied to accelerate the firmware update process for any LoRa-enabled IoT device. In this paper, we investigate ADR techniques in an application that provides remote monitoring of cattle using small, battery-powered devices that transmit data on cattle location and health using LoRa. In addition to issues related to firmware update speed, there are significant concerns regarding reliability and security when updating firmware on mobile, energy-constrained devices. A malicious actor could attempt to steal the firmware to gain access to embedded algorithms or enable faulty behavior by injecting their own code into the device. A firmware update could be subverted due to cattle moving out of the LPWAN range or the device battery not being sufficiently charged to complete the update process. To address these concerns, we propose a secure and reliable firmware update process using ADR techniques that is applicable to any mobile or energy-constrained LoRa device. The proposed system is simulated and then implemented to evaluate its performance and security properties. Full article
(This article belongs to the Special Issue Selected Papers from the Global IoT Summit GIoTS 2020)
Show Figures

Figure 1

Figure 1
<p>Roper device in housing and the sensor board printed circuit board (PCB).</p>
Full article ">Figure 2
<p>The functional diagram of the hardware required for the firmware update process.</p>
Full article ">Figure 3
<p>The packet structures for exchanging data during the initialization phase.</p>
Full article ">Figure 4
<p>The convergence times of the different ADR search techniques.</p>
Full article ">Figure 5
<p>Flash memory breakdown for using external flash.</p>
Full article ">Figure 6
<p>Flash memory breakdown for using internal flash.</p>
Full article ">Figure 7
<p>Timing characterization for Advanced Encryption Standard (AES) and flash read and writes.</p>
Full article ">Figure 8
<p>The energy consumption required to update a 128 kB firmware image.</p>
Full article ">Figure 9
<p>The energy consumption breakdown for the secure implementation.</p>
Full article ">Figure 10
<p>The experimental setup used to validate the firmware update process.</p>
Full article ">Figure 11
<p>The PC interface to control the firmware update.</p>
Full article ">Figure 12
<p>This shows the packet structures for exchanging the firmware image.</p>
Full article ">
33 pages, 10375 KiB  
Article
Distributed Architecture for Unmanned Vehicle Services
by João Ramos, Roberto Ribeiro, David Safadinho, João Barroso, Carlos Rabadão and António Pereira
Sensors 2021, 21(4), 1477; https://doi.org/10.3390/s21041477 - 20 Feb 2021
Cited by 7 | Viewed by 3650
Abstract
The demand for online services is increasing. Services that would require a long time to understand, use and master are becoming as transparent as possible to the users, that tend to focus only on the final goals. Combined with the advantages of the [...] Read more.
The demand for online services is increasing. Services that would require a long time to understand, use and master are becoming as transparent as possible to the users, that tend to focus only on the final goals. Combined with the advantages of the unmanned vehicles (UV), from the unmanned factor to the reduced size and costs, we found an opportunity to bring to users a wide variety of services supported by UV, through the Internet of Unmanned Vehicles (IoUV). Current solutions were analyzed and we discussed scalability and genericity as the principal concerns. Then, we proposed a solution that combines several services and UVs, available from anywhere at any time, from a cloud platform. The solution considers a cloud distributed architecture, composed by users, services, vehicles and a platform, interconnected through the Internet. Each vehicle provides to the platform an abstract and generic interface for the essential commands. Therefore, this modular design makes easier the creation of new services and the reuse of the different vehicles. To confirm the feasibility of the solution we implemented a prototype considering a cloud-hosted platform and the integration of custom-built small-sized cars, a custom-built quadcopter, and a commercial Vertical Take-Off and Landing (VTOL) aircraft. To validate the prototype and the vehicles’ remote control, we created several services accessible via a web browser and controlled through a computer keyboard. We tested the solution in a local network, remote networks and mobile networks (i.e., 3G and Long-Term Evolution (LTE)) and proved the benefits of decentralizing the communications into multiple point-to-point links for the remote control. Consequently, the solution can provide scalable UV-based services, with low technical effort, for anyone at anytime and anywhere. Full article
(This article belongs to the Special Issue Selected Papers from the Global IoT Summit GIoTS 2020)
Show Figures

Figure 1

Figure 1
<p>Pairing between the user and the drone through 2.4 GHz radio.</p>
Full article ">Figure 2
<p>Local network architecture representing a user communicating with a drone via a Wi-Fi router.</p>
Full article ">Figure 3
<p>Representation of the architecture, including the three main entities: platform (<b>A</b>), vehicle stations (<b>B</b>) and users (<b>C</b>).</p>
Full article ">Figure 4
<p>Representation of the tasks’ deployment. Based on the requested services, the platform (<b>B</b>) uploads the respective tasks to the users (<b>A</b>) and the vehicles (<b>C</b>).</p>
Full article ">Figure 5
<p>Representation of a complete service protocol. On the left (<b>A</b>), the user has the task to control and monitor the service. On the top (<b>B</b>), the platform is supervising the service progress and, on the right (<b>C</b>), the vehicle is controlled through the abstraction layer.</p>
Full article ">Figure 6
<p>Overview of the steps involved to create the prototype. It includes the platform deployment, the vehicle integration and the service creation.</p>
Full article ">Figure 7
<p>(<b>a</b>) Integration of the abstraction layer in vehicles that support development through APIs or SDKs; (<b>b</b>) implementation of the abstraction layer on closed-source vehicles that are not planned for development.</p>
Full article ">Figure 8
<p>Picture of the developed vehicle included in the prototype as a UV, including the rotating camera and the ultrasonic sensor.</p>
Full article ">Figure 9
<p>Representation of the abstraction layer built for the custom car. The car waits for the predefined commands and provides a real-time video camera transmission endpoint.</p>
Full article ">Figure 10
<p>MAVLink based vehicle architecture, to comply with the platform integration. These vehicles receive the commands and send the flight information through a WebSockets connection, while streaming the camera’s video in real-time through the WebRTC protocol.</p>
Full article ">Figure 11
<p>Representation of the Spektrum VTOL Airplane: (<b>a</b>) The original E-flite Mini Convergence VTOL; (<b>b</b>) the attached hardware to get Wi-Fi onboard and consequently an Internet connection.</p>
Full article ">Figure 12
<p>Spektrum based VTOL airplane abstraction layer, to provide access to the video camera transmission and flight control.</p>
Full article ">Figure 13
<p>Representation of the control of a vehicle, through a computer keyboard.</p>
Full article ">Figure 14
<p>Control of multiple cars through the cloud platform with four computers.</p>
Full article ">Figure 15
<p>Control of the car with a controllable camera, which includes an extra input group to change its rotation.</p>
Full article ">Figure 16
<p>Representation of the control of a MAVLink quadcopter via the cloud platform: (<b>a</b>) presents the test scenario: a computer, a Wi-Fi router and the UAV; (<b>b</b>) the computer controls the quadcopter in real-time; (<b>c</b>) the quadcopter is manually controlled by a user, through the platform.</p>
Full article ">Figure 17
<p>Representation of the Spektrum VTOL airplane: (<b>a</b>) Spektrum DX6i remote transmitter as the Spektrum VTOL controller; (<b>b</b>) the vehicle tests on bench; (<b>c</b>) control of the customized VTOL airplane through the platform.</p>
Full article ">Figure 18
<p>Results of the response times in a local network scenario, for the test case 1, in a point-to-point communication.</p>
Full article ">Figure 19
<p>Results of the response times in a local network scenario, for the test case 1, communicating through the platform.</p>
Full article ">Figure 20
<p>Results of the response times in the remote networks scenario, for the test case 1, in a point-to-point communication.</p>
Full article ">Figure 21
<p>Results of the response times in the remote networks scenario, for the test case 1, communicating through the platform.</p>
Full article ">Figure 22
<p>Results of the response times in a mobile network scenario (3G), for test case 1, in a point-to-point communication.</p>
Full article ">Figure 23
<p>Results of the response times in a mobile network scenario (LTE), for test case 1, in a point-to-point communication.</p>
Full article ">
21 pages, 1856 KiB  
Article
Hybrid Blockchain for IoT—Energy Analysis and Reward Plan
by Jiejun Hu, Martin J. Reed, Mays Al-Naday and Nikolaos Thomos
Sensors 2021, 21(1), 305; https://doi.org/10.3390/s21010305 - 5 Jan 2021
Cited by 17 | Viewed by 5183
Abstract
Blockchain technology has brought significant advantages for security and trustworthiness, in particular for Internet of Things (IoT) applications where there are multiple organisations that need to verify data and ensure security of shared smart contracts. Blockchain technology offers security features by means of [...] Read more.
Blockchain technology has brought significant advantages for security and trustworthiness, in particular for Internet of Things (IoT) applications where there are multiple organisations that need to verify data and ensure security of shared smart contracts. Blockchain technology offers security features by means of consensus mechanisms; two key consensus mechanisms are, Proof of Work (PoW) and Practical Byzantine Fault Tolerance (PBFT). While the PoW based mechanism is computationally intensive, due to the puzzle solving, the PBFT consensus mechanism is communication intensive due to the all-to-all messages; thereby, both may result in high energy consumption and, hence, there is a trade-off between the computation and the communication energy costs. In this paper, we propose a hybrid-blockchain (H-chain) framework appropriate for scenarios where multiple organizations exist and where the framework enables private transaction verification and public transaction sharing and audit, according to application needs. In particular, we study the energy consumption of the hybrid consensus mechanisms in H-chain. Moreover, this paper proposes a reward plan to incentivize the blockchain agents so that they make contributions to the H-chain while also considering the energy consumption. While the work is generally applicable to IoT applications, the paper illustrates the framework in a scenario which secures an IoT application connected using a software defined network (SDN). The evaluation results first provide a method to balance the public and private parts of the H-chain deployment according to network conditions, computation capability, verification complexity, among other parameters. The simulation results demonstrate that the reward plan can incentivize the blockchain agents to contribute to the H-chain considering the energy consumption of the hybrid consensus mechanism, this enables the proposed H-chain to achieve optimal social welfare. Full article
(This article belongs to the Special Issue Selected Papers from the Global IoT Summit GIoTS 2020)
Show Figures

Graphical abstract

Graphical abstract
Full article ">Figure 1
<p>Illustration of scenario and hybrid-chain architecture.</p>
Full article ">Figure 2
<p>Total energy consumption per block with respect to the number of BCAs. <math display="inline"><semantics> <mrow> <msup> <mi>γ</mi> <mo>*</mo> </msup> <mo>:</mo> <msup> <mi>γ</mi> <mo>′</mo> </msup> <mo>=</mo> <mn>100</mn> <mo>:</mo> <mn>1</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <mi>D</mi> <mo>=</mo> <mn>2</mn> </mrow> </semantics></math>.</p>
Full article ">Figure 3
<p>Total energy consumption with respect of the inter-organisation extra cost factor and the number of BCAs. <math display="inline"><semantics> <mrow> <msup> <mi>γ</mi> <mo>*</mo> </msup> <mo>:</mo> <msup> <mi>γ</mi> <mo>′</mo> </msup> <mo>=</mo> <mn>100</mn> <mo>:</mo> <mn>1</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <mi>D</mi> <mo>=</mo> <mn>2</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <mi>K</mi> <mo>=</mo> <mn>10</mn> </mrow> </semantics></math>.</p>
Full article ">Figure 4
<p>Total energy consumption with respect to the difficulty factor.</p>
Full article ">Figure 5
<p>Total energy consumption with respect to the blocksize. With 5 BCAs in 3 organisations for Proof of Work (PoW), and 5 BCAs each organisation for Practical Byzantine Fault Tolerance (PBFT).</p>
Full article ">Figure 6
<p>Proportion of the private blocks in respect to the number of BCAs and the resource of winning miner.</p>
Full article ">Figure 7
<p>Social welfare and rewards.</p>
Full article ">
22 pages, 707 KiB  
Article
Analysis of Copernicus’ ERA5 Climate Reanalysis Data as a Replacement for Weather Station Temperature Measurements in Machine Learning Models for Olive Phenology Phase Prediction
by Noelia Oses, Izar Azpiroz, Susanna Marchi, Diego Guidotti, Marco Quartulli and Igor G. Olaizola
Sensors 2020, 20(21), 6381; https://doi.org/10.3390/s20216381 - 9 Nov 2020
Cited by 39 | Viewed by 6414
Abstract
Knowledge of phenological events and their variability can help to determine final yield, plan management approach, tackle climate change, and model crop development. THe timing of phenological stages and phases is known to be highly correlated with temperature which is therefore an essential [...] Read more.
Knowledge of phenological events and their variability can help to determine final yield, plan management approach, tackle climate change, and model crop development. THe timing of phenological stages and phases is known to be highly correlated with temperature which is therefore an essential component for building phenological models. Satellite data and, particularly, Copernicus’ ERA5 climate reanalysis data are easily available. Weather stations, on the other hand, provide scattered temperature data, with fragmentary spatial coverage and accessibility, as such being scarcely efficacious as unique source of information for the implementation of predictive models. However, as ERA5 reanalysis data are not real temperature measurements but reanalysis products, it is necessary to verify whether these data can be used as a replacement for weather station temperature measurements. The aims of this study were: (i) to assess the validity of ERA5 data as a substitute for weather station temperature measurements, (ii) to test different machine learning models for the prediction of phenological phases while using different sets of features, and (iii) to optimize the base temperature of olive tree phenological model. The predictive capability of machine learning models and the performance of different feature subsets were assessed when comparing the recorded temperature data, ERA5 data, and a simple growing degree day phenological model as benchmark. Data on olive tree phenology observation, which were collected in Tuscany for three years, provided the phenological phases to be used as target variables. The results show that ERA5 climate reanalysis data can be used for modelling phenological phases and that these models provide better predictions in comparison with the models trained with weather station temperature measurements. Full article
(This article belongs to the Special Issue Selected Papers from the Global IoT Summit GIoTS 2020)
Show Figures

Figure 1

Figure 1
<p>Dataset size by location and year.</p>
Full article ">Figure 2
<p><span class="html-italic">GDD Tavg calculation</span>.</p>
Full article ">Figure 3
<p><span class="html-italic">GDD Allen calculation</span>.</p>
Full article ">Figure 4
<p>Random forest model performance comparison using different predictors.</p>
Full article ">Figure 5
<p>Combined metric mean and median values for random forest model performance comparison using different predictors.</p>
Full article ">Figure 6
<p>Performance metrics for different ML models trained and tested under the scenarios specified in <a href="#sensors-20-06381-t001" class="html-table">Table 1</a>.</p>
Full article ">Figure 7
<p>Model selection for the scenarios specified in <a href="#sensors-20-06381-t001" class="html-table">Table 1</a>.</p>
Full article ">Figure 8
<p>Combined metric mean and median values for the scenarios specified in <a href="#sensors-20-06381-t001" class="html-table">Table 1</a>.</p>
Full article ">Figure 9
<p>Metrics’ comparison for the models in the scenarios described in <a href="#sensors-20-06381-t003" class="html-table">Table 3</a>.</p>
Full article ">Figure 10
<p>Residual histogram for the models in the scenarios described in <a href="#sensors-20-06381-t003" class="html-table">Table 3</a>.</p>
Full article ">Figure 11
<p>Comparison of the residuals by DOY for the different models’ in the scenarios described in <a href="#sensors-20-06381-t003" class="html-table">Table 3</a>.</p>
Full article ">Figure 12
<p>Comparison of the residuals by target output for the different models’ in the scenarios described in <a href="#sensors-20-06381-t003" class="html-table">Table 3</a>.</p>
Full article ">Figure 13
<p>Comparison of the residuals by location for the different models’ in the scenarios described in <a href="#sensors-20-06381-t003" class="html-table">Table 3</a>.</p>
Full article ">Figure 14
<p>Base temperature optimisation for the scenarios described in <a href="#sensors-20-06381-t003" class="html-table">Table 3</a>: confidence intervals for Accuracy, RMSE, and combined metric.</p>
Full article ">
30 pages, 1168 KiB  
Article
Addressing Conceptual Randomness in IoT-Driven Business Ecosystem Research
by Fabien Rezac
Sensors 2020, 20(20), 5842; https://doi.org/10.3390/s20205842 - 15 Oct 2020
Cited by 7 | Viewed by 3915
Abstract
During the almost 27 years of its existence, the business ecosystem research has developed a substantial level of ambiguity and multifacetedness. Because to the technological advancements that promote interconnectedness and value co-creation, the field has consequently spun off into more domain-specific branches, such [...] Read more.
During the almost 27 years of its existence, the business ecosystem research has developed a substantial level of ambiguity and multifacetedness. Because to the technological advancements that promote interconnectedness and value co-creation, the field has consequently spun off into more domain-specific branches, such as the arena of digital business ecosystems that are driven by Internet of Things (IoT). Nonetheless, despite the efforts to mend the theoretical foundations and to close the gap between academia and empirical practice, the absolute majority of IoT-driven digital business ecosystem literature follows the trend of conceptual randomness while expanding the volume of publications exponentially. Therefore, in order to address this unfavourable increase in random adoption of distinct concepts that ultimately refer to the same subject matter, the author encourages other scholars involved in the research field of IoT-driven digital business ecosystems to make extended efforts and support the external validity of their research (as well as the relevance of the research stream as a whole) by bounding the IoT-driven digital business ecosystems on a rigorous basis through deploying the extant theory in a careful and appropriate manner. Via a thorough examination of the theoretical fundaments that underpin the concept of IoT-driven digital business ecosystem, and based on a concise thematic review of corresponding literature published until September 2020, this article articulates logic for viewing the conceptual hierarchy within the business ecosystem research and proposes six literature-based recommendations for developing further IoT-driven digital business ecosystem (DBE) research in a rigorous way. Full article
(This article belongs to the Special Issue Selected Papers from the Global IoT Summit GIoTS 2020)
Show Figures

Figure 1

Figure 1
<p>Relevant peer-reviewed literature search results.</p>
Full article ">Figure 2
<p>Proposed logic of conceptual hierarchy within the business ecosystem (BE) research.</p>
Full article ">

Review

Jump to: Research

40 pages, 8198 KiB  
Review
Recent Advances in Internet of Things (IoT) Infrastructures for Building Energy Systems: A Review
by Wahiba Yaïci, Karthik Krishnamurthy, Evgueniy Entchev and Michela Longo
Sensors 2021, 21(6), 2152; https://doi.org/10.3390/s21062152 - 19 Mar 2021
Cited by 59 | Viewed by 9165
Abstract
This paper summarises a literature review on the applications of Internet of Things (IoT) with the aim of enhancing building energy use and reducing greenhouse gas emissions (GHGs). A detailed assessment of contemporary practical reviews and works was conducted to understand how different [...] Read more.
This paper summarises a literature review on the applications of Internet of Things (IoT) with the aim of enhancing building energy use and reducing greenhouse gas emissions (GHGs). A detailed assessment of contemporary practical reviews and works was conducted to understand how different IoT systems and technologies are being developed to increase energy efficiencies in both residential and commercial buildings. Most of the reviewed works were invariably related to the dilemma of efficient heating systems in buildings. Several features of the central components of IoT, namely, the hardware and software needed for building controls, are analysed. Common design factors across the many IoT systems comprise the selection of sensors and actuators and their powering techniques, control strategies for collecting information and activating appliances, monitoring of actual data to forecast prospect energy consumption and communication methods amongst IoT components. Some building energy applications using IoT are provided. It was found that each application presented has the potential for significant energy reduction and user comfort improvement. This is confirmed in two case studies summarised, which report the energy savings resulting from implementing IoT systems. Results revealed that a few elements are user-specific that need to be considered in the decision processes. Last, based on the studies reviewed, a few aspects of prospective research were recommended. Full article
(This article belongs to the Special Issue Selected Papers from the Global IoT Summit GIoTS 2020)
Show Figures

Figure 1

Figure 1
<p>The overall world population and the connected devices by 2020 [<a href="#B6-sensors-21-02152" class="html-bibr">6</a>].</p>
Full article ">Figure 2
<p>Internet of Things (IoT)-based system architecture [<a href="#B8-sensors-21-02152" class="html-bibr">8</a>].</p>
Full article ">Figure 3
<p>Research works by topics on IoT infrastructures for building energy systems.</p>
Full article ">Figure 4
<p>Building energy management system using fuzzy logic approach [<a href="#B33-sensors-21-02152" class="html-bibr">33</a>].</p>
Full article ">Figure 5
<p>System architecture based on The Things Network [<a href="#B30-sensors-21-02152" class="html-bibr">30</a>].</p>
Full article ">Figure 6
<p>Network using constrained application protocol (CoAP) sensors [<a href="#B35-sensors-21-02152" class="html-bibr">35</a>].</p>
Full article ">Figure 7
<p>Schematic block diagram of the IoT energy monitoring system.</p>
Full article ">Figure 8
<p>EnerMon long-range (LoRa) IoT system design [<a href="#B41-sensors-21-02152" class="html-bibr">41</a>].</p>
Full article ">Figure 9
<p>Schematic of the IoT-integrated tool [<a href="#B44-sensors-21-02152" class="html-bibr">44</a>].</p>
Full article ">Figure 10
<p>Developed thermoelectric air management architecture: integrating IoT and cloud computing [<a href="#B51-sensors-21-02152" class="html-bibr">51</a>].</p>
Full article ">Figure 11
<p>Power consumption with and without IoT-based thermoelectric air conditioning system for two input power operations [<a href="#B51-sensors-21-02152" class="html-bibr">51</a>].</p>
Full article ">Figure 12
<p>Structure of the IoT system: (<b>a</b>) system configuration and (<b>b</b>) system flow and installation [<a href="#B54-sensors-21-02152" class="html-bibr">54</a>].</p>
Full article ">Figure 13
<p>Sensor readings and actuator responses of IoT system [<a href="#B54-sensors-21-02152" class="html-bibr">54</a>].</p>
Full article ">Figure 14
<p>Schematic of system arrangement of IoT architecture [<a href="#B55-sensors-21-02152" class="html-bibr">55</a>].</p>
Full article ">Figure 15
<p>Building sensor layout of case study [<a href="#B56-sensors-21-02152" class="html-bibr">56</a>].</p>
Full article ">Figure 16
<p>Schematic of smart home incorporating IoT and cloud computing [<a href="#B59-sensors-21-02152" class="html-bibr">59</a>].</p>
Full article ">Figure 17
<p>Comparison between various computational architectures for building automation: (<b>a</b>) conventional method, (<b>b</b>) full cloud computing method and (<b>c</b>) edge computing method. Air Sp.: Air speed; DB: database; RH: relative humidity; UI: user interface; VOC: volatile organic compound [<a href="#B60-sensors-21-02152" class="html-bibr">60</a>].</p>
Full article ">Figure 18
<p>Energy management framework for residential buildings [<a href="#B42-sensors-21-02152" class="html-bibr">42</a>].</p>
Full article ">Figure 19
<p>Measurement and control hardware: (<b>a</b>) sensor board, (<b>b</b>) Raspberry Pi with LoRa Hat, (<b>c</b>) energy monitoring system and amperometric clamps, (<b>d</b>) smart wall switch, (<b>e</b>) smart power socket and (<b>f</b>) Wi-Fi/Infrared [<a href="#B30-sensors-21-02152" class="html-bibr">30</a>].</p>
Full article ">Figure 20
<p>Kindergarten layout with sensors shown in yellow, air conditioning units shown in blue, and infrared emitters shown in red [<a href="#B30-sensors-21-02152" class="html-bibr">30</a>].</p>
Full article ">Figure 21
<p>An example of the daily report delivered from IoT system analysis [<a href="#B71-sensors-21-02152" class="html-bibr">71</a>].</p>
Full article ">Figure 22
<p>SHIELD IoT security system architecture [<a href="#B81-sensors-21-02152" class="html-bibr">81</a>].</p>
Full article ">
Back to TopTop