Explore chapters and articles related to this topic
A Framework for Blockchain-, AI-, and IoT-Driven Smart and Secure New-Generation Agriculture
Published in Debarka Mukhopadhyay, Siddhartha Bhattacharyya, Balachandran Krishnan, Sudipta Roy, Blockchain for IoT, 2023
Rohit Kumar Kasera, Raktim Deb, Tapodhir Acharjee
The architecture combines multiple networks for scalability and larger range of coverage. The proposed architecture uses a WiLD network and a set of IPv6 over low-power wireless personal area networks (6LoWPAN)-enabled WSN networks. The goal is to make the network cover more area and be more scalable. A gateway is used for providing security, identification, and sending and receiving of data between two networks. The gateway is compatible with IEEE 802.15.4 network (6LoWPAN) and 802.11 networks (WiLD networks). For connecting the rural remote location to the internet, the WiLD network is used. Also the method uses Fog computing for real-time control, analyzes data in milliseconds, and sends a particular period’s calculated aggregated data, thus reducing latency. Application layer protocol used in IoT-like message queuing telemetry transport (MQTT) and constrained application protocol (CoAP) are used in this method for receiving sensor data. Lastly, a cloud in IoT is used to provide the facility with computing resources from the storage server in on-demand fashion.
5G-Enabled IoT
Published in Parag Chatterjee, Robin Singh Bhadoria, Yadunath Pathak, 5G and Beyond, 2022
Mangal Singh, Shruti Goel, Ram Kishan Dewangan
In CCN architecture, the gateway is called the CCN-IoT gateway. A gateway is a device which connects two different networks. There are two CCN management services—global and domain management services. The global service orchestration and management consists of three planes: data plane, service plane and control plane. The data plane is responsible for transmitting data packets and the control plane tells the data plane which service the data has to be transmitted to. With the help of domain orchestration and management service, CCN uses cache sharing, that is, each router has the ability to store data. With the help of SE-RAN all the devices are connected to a radio access network. Some of the features of CCN like computing, caching, security, and so on, can help to support high-bandwidth 5G applications.
Wireless Sensor Applications for Building Operation and Management
Published in Barney L. Capehart, Lynne C. Capehart, Paul J. Allen, David C. Green, Web Based Energy Information and Control Systems:, 2021
Michael R. Brambley, Michael Kintner-Meyer, Srinivas Katipamula, Patrick J. O’Neill
Wireless sensor networks have different requirements than computer networks and, thus, different network topologies and communication protocols have evolved for them. The simplest is the point-to-point topology (see Figure 27-2) in which two nodes communicate directly with each other. The point-to-multipoint or star topology is an extension of the point-to-point configuration in which many nodes communicate with a central receiving or gateway node. In the star and point-to-point network topologies, sensor nodes might have pure transmitters, which provide one-way communication only, or transceivers, which enable two-way communication and verification of the receipt of messages. Gateways provide a means to convert and pass data between one protocol and another (e.g., from a wireless sensor network protocol to the wired Ethernet protocol).
An efficient energy measurement system based on the TOF sensor for structural crack monitoring in architecture
Published in Journal of Information and Telecommunication, 2023
Tran Anh Khoa, Pham Duc Lam, Nguyen Hoang Nam
The gateway node acts as a gateway to convert data between two protocols, LoRa and Internet Protocol (IP), and is responsible for receiving signals forward from sensor nodes and classifying, packaging, and pushing data to the machine host via the Internet. The gateway node is composed of three units: the source unit (power unit), the central processing unit (processing unit) and the wireless communication unit (communication unit), as shown in Figure 4. The source unit of the gateway node used in this case is taken directly from the 220 V civilian electricity supply and converted to 5 V DC power through an adapter. The central processing unit of the gateway node is the microcontroller ESP32-WROOM-32, which is integrated on DevKit v1 and features high processing speed and stability, Wi-Fi connectivity, and straightforward data transfer to the Internet. Regarding the wireless communication of the gateway node, to increase compatibility with the sensor nodes, the gateway node also uses the low-power E32-TTL-100 module to communicate data from long-distance sensor nodes.
Internet of Thing based Koch Fractal Curve Fractal Antennas for Wireless Applications
Published in IETE Journal of Research, 2022
Kusum Yadav, Anurag Jain, Nada Mohamed Osman Sid Ahmed, Sawsan Ali Saad Hamad, Gaurav Dhiman, Shoayee Dlaim Alotaibi
In IoT systems, the Network Layer is a communication channel that allows the information received from the detection layer to be sent to the computing unit for processing. DDoS/DoS Attacks, Sinkhole, Blackhole, Wormhole, Sybil, Redirect Attacks etc., attacks are made on this layer. Middleware, another layer in IoT systems, creates an abstract layer between the Network and Application layer, providing robust computation and storage capabilities. Queuing systems, APIs that fulfil the application layer's request, web services, persistent data stores, etc. located in this layer. On the other hand, Gateway plays an essential role in connecting to multiple devices, users, and cloud services. This layer offers software and hardware solutions in IoT devices. Gateways are also used for encryption and decryption of IoT data between different layers. Security-related attacks can occur between heterogeneous IoT systems (Zigbee, WSN, Lorain, Z-Wave, LoRa, WiFi, Bluetooth, cellular networks, etc.). SQL Vaccination Attack on databases, Man-in-the-Middle Attack on MQTT protocol that offers a broadcast subscription communication model in IoT systems, Attacks on Signatures used in web services, Malware Vaccination on cloud systems, Cloud Raid Attack, which reduces the quality of service (QoS), which is similar to DoS attack, takes place in this layer.