Your browser doesn't support javascript.
loading
Show: 20 | 50 | 100
Results 1 - 20 de 20
Filter
1.
Heliyon ; 10(12): e31846, 2024 Jun 30.
Article in English | MEDLINE | ID: mdl-38952363

ABSTRACT

The Internet of Things communication protocol is prone to security vulnerabilities when facing increasing types and scales of network attacks, which can affect the communication security of the Internet of Things. It is crucial to effectively detect these vulnerabilities in order to improve the security of IoT communication protocols and promptly fix them. Therefore, this study proposes a distributed IoT communication protocol vulnerability detection method based on an improved parallelized fuzzy testing algorithm. Firstly, based on design principles and by comparing different communication protocols, a communication architecture for the distribution network's Internet of Things was constructed, and the communication protocols were formalized and decomposed. Next, preprocess the vulnerability detection samples, and then use genetic algorithm to improve the parallelized fuzzy testing algorithm to perform vulnerability detection. Through this improved algorithm, the missed detection rate and false detection rate can be effectively reduced, thereby improving the security of IoT communication protocols. The experimental results show that the highest missed detection rate of this method is only 4.0 %, and the false detection rate is low, with high detection efficiency. This indicates that the method has good performance and reliability in detecting vulnerabilities in IoT communication protocols.

2.
Sensors (Basel) ; 24(14)2024 Jul 10.
Article in English | MEDLINE | ID: mdl-39065869

ABSTRACT

Compact, energy-efficient, and autonomous wireless sensor nodes offer incredible versatility for various applications across different environments. Although these devices transmit and receive real-time data, efficient energy storage (ES) is crucial for their operation, especially in remote or hard-to-reach locations. Rechargeable batteries are commonly used, although they often have limited storage capacity. To address this, ultra-low-power design techniques (ULPDT) can be implemented to reduce energy consumption and prolong battery life. The Energy Harvesting Technique (EHT) enables perpetual operation in an eco-friendly manner, but may not fully replace batteries due to its intermittent nature and limited power generation. To ensure uninterrupted power supply, devices such as ES and power management unit (PMU) are needed. This review focuses on the importance of minimizing power consumption and maximizing energy efficiency to improve the autonomy and longevity of these sensor nodes. It examines current advancements, challenges, and future direction in ULPDT, ES, PMU, wireless communication protocols, and EHT to develop and implement robust and eco-friendly technology solutions for practical and long-lasting use in real-world scenarios.

3.
Sensors (Basel) ; 21(12)2021 Jun 11.
Article in English | MEDLINE | ID: mdl-34208142

ABSTRACT

The Internet of Things world is in need of practical solutions for its security. Existing security mechanisms for IoT are mostly not implemented due to complexity, budget, and energy-saving issues. This is especially true for IoT devices that are battery powered, and they should be cost effective to be deployed extensively in the field. In this work, we propose a new cross-layer approach combining existing authentication protocols and existing Physical Layer Radio Frequency Fingerprinting technologies to provide hybrid authentication mechanisms that are practically proved efficient in the field. Even though several Radio Frequency Fingerprinting methods have been proposed so far, as a support for multi-factor authentication or even on their own, practical solutions are still a challenge. The accuracy results achieved with even the best systems using expensive equipment are still not sufficient on real-life systems. Our approach proposes a hybrid protocol that can save energy and computation time on the IoT devices side, proportionally to the accuracy of the Radio Frequency Fingerprinting used, which has a measurable benefit while keeping an acceptable security level. We implemented a full system operating in real time and achieved an accuracy of 99.8% for the additional cost of energy, leading to a decrease of only ~20% in battery life.

4.
Sensors (Basel) ; 21(11)2021 May 24.
Article in English | MEDLINE | ID: mdl-34073975

ABSTRACT

The growth of the Internet of Things (IoT) offers numerous opportunities for developing industrial applications such as smart grids, smart cities, smart manufacturers, etc. By utilising these opportunities, businesses engage in creating the Industrial Internet of Things (IIoT). IoT is vulnerable to hacks and, therefore, requires various techniques to achieve the level of security required. Furthermore, the wider implementation of IIoT causes an even greater security risk than its benefits. To provide a roadmap for researchers, this survey discusses the integrity of industrial IoT systems and highlights the existing security approaches for the most significant industrial applications. This paper mainly classifies the attacks and possible security solutions regarding IoT layers architecture. Consequently, each attack is connected to one or more layers of the architecture accompanied by a literature analysis on the various IoT security countermeasures. It further provides a critical analysis of the existing IoT/IIoT solutions based on different security mechanisms, including communications protocols, networking, cryptography and intrusion detection systems. Additionally, there is a discussion of the emerging tools and simulations used for testing and evaluating security mechanisms in IoT applications. Last, this survey outlines several other relevant research issues and challenges for IoT/IIoT security.

5.
J Educ Health Promot ; 9: 262, 2020.
Article in English | MEDLINE | ID: mdl-33282967

ABSTRACT

INTRODUCTION: Providing information exchange and collaboration between isolated information systems (ISs) is essential in the health-care environments. In this context, we aimed to develop a communication protocol to facilitate better interoperability among electrophysiology study (EPS)-related ISs in order to allow exchange unified reporting in EPS ablation. MATERIALS AND METHODS: This study was an applied-descriptive research that was conducted in 2019. To determine the information content of agreed cardiac EPS Minimum Data Set (MDS) in Iran, the medical record of patients undergoing EPS ablation procedure in the Tehran Heart Center (THC) hospital was reviewed by a checklist. Then, an information model based on Health Level Seven, Clinical Document Architecture (HL7 CDA) standard framework for structural interoperability has been developed. In this framework, using NPEX online browser and MindMaple software, a set of terminology mapping rules was used for consistent transfer of data between various ISs. RESULTS: The information content of each data field was introduced into the heading and body sections of HL7 CDA document using Systematized Nomenclature of Medicine - Clinical Terminology names and codes. Then, the ontology alignment was designed in the form of thesaurus mapping routes. CONCLUSION: The sensitive, complex, and multidimensional nature of cardiovascular conditions requires special attention to the interoperability of ISs. Designing customized communication protocols plays an important role in improving the interoperability, and they are compatible with the needs of future Iranian health information exchange.

6.
Neural Netw ; 130: 143-151, 2020 Oct.
Article in English | MEDLINE | ID: mdl-32659593

ABSTRACT

In this paper, the protocol-based remote state estimation problem is considered for a kind of delayed artificial neural networks. The random time-varying delays fall into certain intervals with known probability distributions. For the sake of reducing the data collisions in communication channel from the sensors to the estimator, the stochastic communication protocol (SCP) is employed to decide which sensor is allowed to transmit its data to the remote estimator through the channel at each fixed instant. The scheduling principle of the SCP is governed by a Markov chain whose transition probability is allowed to be uncertain so as to reflect the possible imprecision when implementing the SCP. Through a combination of Lyapunov-Krasovskii functional method and the stochastic analysis technique, a sufficient criterion is obtained for the existence of the desired remote state estimator ensuring that the corresponding augmented estimation error dynamics is asymptotically stable with a prescribed H∞ performance index. Furthermore, the estimator parameter is acquired by solving a convex optimization problem. Finally, the validity of the established theoretical results is demonstrated via a numerical simulation example.


Subject(s)
Communication , Neural Networks, Computer , Uncertainty , Markov Chains , Probability , Stochastic Processes , Time Factors
7.
Sensors (Basel) ; 20(13)2020 Jun 28.
Article in English | MEDLINE | ID: mdl-32605178

ABSTRACT

The Internet of Things (IoT) is leading today's digital transformation. Relying on a combination of technologies, protocols, and devices such as wireless sensors and newly developed wearable and implanted sensors, IoT is changing every aspect of daily life, especially recent applications in digital healthcare. IoT incorporates various kinds of hardware, communication protocols, and services. This IoT diversity can be viewed as a double-edged sword that provides comfort to users but can lead also to a large number of security threats and attacks. In this survey paper, a new compacted and optimized architecture for IoT is proposed based on five layers. Likewise, we propose a new classification of security threats and attacks based on new IoT architecture. The IoT architecture involves a physical perception layer, a network and protocol layer, a transport layer, an application layer, and a data and cloud services layer. First, the physical sensing layer incorporates the basic hardware used by IoT. Second, we highlight the various network and protocol technologies employed by IoT, and review the security threats and solutions. Transport protocols are exhibited and the security threats against them are discussed while providing common solutions. Then, the application layer involves application protocols and lightweight encryption algorithms for IoT. Finally, in the data and cloud services layer, the main important security features of IoT cloud platforms are addressed, involving confidentiality, integrity, authorization, authentication, and encryption protocols. The paper is concluded by presenting the open research issues and future directions towards securing IoT, including the lack of standardized lightweight encryption algorithms, the use of machine-learning algorithms to enhance security and the related challenges, the use of Blockchain to address security challenges in IoT, and the implications of IoT deployment in 5G and beyond.

8.
Sensors (Basel) ; 20(10)2020 May 17.
Article in English | MEDLINE | ID: mdl-32429513

ABSTRACT

The evolution of computing devices and ubiquitous computing has led to the development of the Internet of Things (IoT). Smart Grids (SGs) stand out among the many applications of IoT and comprise several embedded intelligent technologies to improve the reliability and the safety of power grids. SGs use communication protocols for information exchange, such as the Open Smart Grid Protocol (OSGP). However, OSGP does not support the integration with devices compliant with the Constrained Application Protocol (CoAP), a communication protocol used in conventional IoT systems. In this sense, this article presents an efficient software interface that provides integration between OSGP and CoAP. The results obtained demonstrate the effectiveness of the proposed solution, which presents low communication overhead and enables the integration between IoT and SG systems.

9.
Sensors (Basel) ; 20(1)2019 Dec 19.
Article in English | MEDLINE | ID: mdl-31861539

ABSTRACT

The coming years may see the advent of distributed implantable devices to support bioelectronic medicinal treatments. Communication between implantable components and between deep implants and the outside world can be challenging. Percutaneous wired connectivity is undesirable and both radiofrequency and optical methods are limited by tissue absorption and power safety limits. As such, there is a significant potential niche for ultrasound communications in this domain. In this paper, we present the design and testing of a reliable and efficient ultrasonic communication telemetry scheme using piezoelectric transducers that operate at 320 kHz frequency. A key challenge results from the multi-propagation path effect. Therefore, we present a method, using short pulse sequences with relaxation intervals. To counter an increasing bit, and thus packet, error rate with distance, we have incorporated an error correction encoding scheme. We then demonstrate how the communication scheme can scale to a network of implantable devices. We demonstrate that we can achieve an effective, error-free, data rate of 0.6 kbps, which is sufficient for low data rate bioelectronic medicine applications. Transmission can be achieved at an energy cost of 642 nJ per bit data packet using on/off power cycling in the electronics.


Subject(s)
Telemetry/methods , Humans , Prostheses and Implants , Radio Waves , Signal-To-Noise Ratio , Telemedicine , Telemetry/instrumentation , Transducers , Wireless Technology
10.
Sensors (Basel) ; 19(21)2019 Oct 28.
Article in English | MEDLINE | ID: mdl-31661937

ABSTRACT

Integrated systems based on wireless sensor networks (WSNs) and unmanned aerial vehicles (UAVs) with electric propulsion are emerging as state-of-the-art solutions for large scale monitoring. Main advances stemming both from complex system architectures as well as powerful embedded computing and communication platforms, advanced sensing and networking protocols have been leveraged to prove the viability of this concept. The design of suitable algorithms for data processing, communication and control across previously disparate domains has thus currently become an intensive area of interdisciplinary research. The paper was focused on the collaborative aspects of UAV-WSN systems and the reference papers were analyzed from this point of view, on each functional module. The paper offers a timely review of recent advances in this area of critical interest with focus on a comparative perspective across multiple recent theoretical and applied contributions. A systematic approach is carried out in order to structure a unitary from conceptual design towards key implementation aspects. Focus areas are identified and discussed such as distributed data processing algorithms, hierarchical multi-protocol networking aspects and high level WSN-constrained UAV-control. Application references are highlighted in various domains such as environmental, agriculture, emergency situations and homeland security. Finally, a research agenda is outlined to advance the field towards tangible economic and social impact.

11.
Sensors (Basel) ; 19(16)2019 Aug 19.
Article in English | MEDLINE | ID: mdl-31431005

ABSTRACT

Development of the Internet of Things (IoT) opens many new challenges. As IoT devices are getting smaller and smaller, the problems of so-called "constrained devices" arise. The traditional Internet protocols are not very well suited for constrained devices comprising localized network nodes with tens of devices primarily communicating with each other (e.g., various sensors in Body Area Network communicating with each other). These devices have very limited memory, processing, and power resources, so traditional security protocols and architectures also do not fit well. To address these challenges the Fog computing paradigm is used in which all constrained devices, or Edge nodes, primarily communicate only with less-constrained Fog node device, which collects all data, processes it and communicates with the outside world. We present a new lightweight secure self-authenticable transfer protocol (SSATP) for communications between Edge nodes and Fog nodes. The primary target of the proposed protocol is to use it as a secure transport for CoAP (Constrained Application Protocol) in place of UDP (User Datagram Protocol) and DTLS (Datagram Transport Layer Security), which are traditional choices in this scenario. SSATP uses modified header fields of standard UDP packets to transfer additional protocol handling and data flow management information as well as user data authentication information. The optional redundant data may be used to provide increased resistance to data losses when protocol is used in unreliable networks. The results of experiments presented in this paper show that SSATP is a better choice than UDP with DTLS in the cases, where the CoAP block transfer mode is used and/or in lossy networks.

12.
J Educ Health Promot ; 8: 99, 2019.
Article in English | MEDLINE | ID: mdl-31143816

ABSTRACT

INTRODUCTION: Interoperability will provide similar understanding on the meaning of communicated messages to intelligent systems and their users. This feature is essential for controlling and managing contagious diseases which threaten public health, such as acquired immunodeficiency syndrome (AIDS). The aim of this study was also designing communication protocols for normalizing the content and structure of intelligent messages in order to optimize the interoperability. MATERIALS AND METHODS: This study used a checklist to extract information content compatible with minimum data set (MDS) of AIDS. After coding information content through selected classification and nomenclature systems, the reliability and validity of codes were evaluated by external agreement method. The MindMaple software was used for mapping the information content to Systematized Nomenclature of Medicine-Clinical Terminology (SNOMED-CT) integrated codes. Finally, the Clinical Document Architecture (CDA) format was used for standard structuring of information content. RESULTS: The information content standard format, compatible selected classification, or nomenclature system and their codes were determined for all information contents. Their corresponding codes in SNOMED-CT were structured in the form of CDA body and title. CONCLUSION: The complex and multidimensional nature of AIDS requires the participation of multidisciplinary teams from different organizations, complex analyzes, multidimensional and complex information modeling, and maximum interoperability. In this study, the use of CDA structure along with SNOMED-CT codes is completely compatible with optimal interoperability needs for AIDS control and management.

13.
Sensors (Basel) ; 18(8)2018 Aug 07.
Article in English | MEDLINE | ID: mdl-30087303

ABSTRACT

This paper proposes a new communication protocol for output-feedback control through multi-hop Wireless Sensor Network (WSN). The protocol is based on a Hop-by-Hop transport scheme and is especially devised to simultaneously fulfill two conflicting criteria: the network energy consumption and the stability/performance (in terms of H∞ norm) of the closed-loop system. The proposed protocol can be implemented by means of three heuristics, basically using distinct rules to control the maximum number of retransmissions allowed in terms of the voltage level of the batteries of the network nodes. As another contribution, a Markov jump based representation is proposed to model the packet loss in the communication channel, giving rise to a systematic procedure to determine the transition probability matrix and the Markov chain operation modes of a network with multiple information sources. The synthesis of the output-feedback controller is made in two steps (observer filter plus a state-feedback controller) for the Markov model assuming partial availability of the operation modes. The efficiency and applicability of the communication protocol is illustrated by means of a numerical experiment, based on a physical model of a coupled tanks plant. The features of each heuristic of implementation of the proposed protocol are presented in the numerical comparisons.

14.
Sensors (Basel) ; 18(2)2018 Feb 08.
Article in English | MEDLINE | ID: mdl-29419784

ABSTRACT

Network lifetime maximization of wireless biomedical implant systems is one of the major research challenges of wireless body area networks (WBANs). In this paper, a mutual information (MI)-based incremental relaying communication protocol is presented where several on-body relay nodes and one coordinator are attached to the clothes of a patient. Firstly, a comprehensive analysis of a system model is investigated in terms of channel path loss, energy consumption, and the outage probability from the network perspective. Secondly, only when the MI value becomes smaller than the predetermined threshold is data transmission allowed. The communication path selection can be either from the implanted sensor to the on-body relay then forwards to the coordinator or from the implanted sensor to the coordinator directly, depending on the communication distance. Moreover, mathematical models of quality of service (QoS) metrics are derived along with the related subjective functions. The results show that the MI-based incremental relaying technique achieves better performance in comparison to our previous proposed protocol techniques regarding several selected performance metrics. The outcome of this paper can be applied to intra-body continuous physiological signal monitoring, artificial biofeedback-oriented WBANs, and telemedicine system design.


Subject(s)
Prostheses and Implants , Computer Communication Networks , Models, Theoretical , Monitoring, Physiologic , Telemedicine , Wireless Technology
15.
J Genet Couns ; 27(2): 370-380, 2018 04.
Article in English | MEDLINE | ID: mdl-29199389

ABSTRACT

Communicating personalized genomic risk results for common diseases to the general population as a form of tailored prevention is novel and may require alternative genetic counseling service delivery models. We describe the development and evaluation of a communication protocol for disclosing melanoma genomic risk information to the asymptomatic general population and assess participants' satisfaction and acceptability. Participants (n = 117) were aged 22-69 years, living in New South Wales, Australia and unselected for family history. They provided a saliva sample and had genomic testing for melanoma for low to moderate penetrant melanoma susceptibility variants in 21 genes. Participants could choose to receive their results from a genetic counselor via telephone, followed by a mailed booklet or to receive their risk result via mailed booklet only with a follow-up call for those at high risk. A follow-up questionnaire was completed by 85% of participants 3-months later. Most participants (80%) elected to receive their result via telephone. Participants were highly satisfied with the delivery of results (mean 3.4 out of 4, standard deviation 0.5), and this did not differ by delivery mode, risk category, age or sex. On follow-up, 75% accurately recalled their risk category, 6% indicated a preference for a different delivery mode, either electronic or face-to-face. The process of disclosing genomic risk results to the general population over the telephone with accompanying written material was feasible and acceptable, and may be useful for communicating polygenic risk for common diseases in the context of increasing demands for genomic testing.


Subject(s)
Communication , Genome, Human , Melanoma/epidemiology , Precision Medicine , Telephone , Adult , Aged , Female , Humans , Male , Melanoma/genetics , Middle Aged , New South Wales/epidemiology , Program Evaluation , Risk Factors , Surveys and Questionnaires , Young Adult
16.
J Neurosci Methods ; 227: 140-50, 2014 Apr 30.
Article in English | MEDLINE | ID: mdl-24613794

ABSTRACT

This paper presents the design of a complete multi-channel neural recording compression and communication system for wireless implants that addresses the challenging simultaneous requirements for low power, high bandwidth and error-free communication. The compression engine implements discrete wavelet transform (DWT) and run length encoding schemes and offers a practical data compression solution that faithfully preserves neural information. The communication engine encodes data and commands separately into custom-designed packet structures utilizing a protocol capable of error handling. VLSI hardware implementation of these functions, within the design constraints of a 32-channel neural compression implant, is presented. Designed in 0.13µm CMOS, the core of the neural compression and communication chip occupies only 1.21mm(2) and consumes 800µW of power (25µW per channel at 26KS/s) demonstrating an effective solution for intra-cortical neural interfaces.


Subject(s)
Data Compression , Neurons/physiology , Telemetry/instrumentation , Wavelet Analysis , Action Potentials/physiology , Animals , Cerebral Cortex/cytology , Data Compression/methods , Humans , Prostheses and Implants , Telemetry/methods
17.
Sensors (Basel) ; 8(8): 4529-4559, 2008 Aug 04.
Article in English | MEDLINE | ID: mdl-27873772

ABSTRACT

Technological progress in the fields of Micro Electro-Mechanical Systems (MEMS) and wireless communications and also the availability of CMOS cameras, microphones and small-scale array sensors, which may ubiquitously capture multimedia content from the field, have fostered the development of low-cost limited resources Wireless Video-based Sensor Networks (WVSN). With regards to the constraints of videobased sensor nodes and wireless sensor networks, a supporting video stream is not easy to implement with the present sensor network protocols. In this paper, a thorough architecture is presented for video transmission over WVSN called Energy-efficient and high-Quality Video transmission Architecture (EQV-Architecture). This architecture influences three layers of communication protocol stack and considers wireless video sensor nodes constraints like limited process and energy resources while video quality is preserved in the receiver side. Application, transport, and network layers are the layers in which the compression protocol, transport protocol, and routing protocol are proposed respectively, also a dropping scheme is presented in network layer. Simulation results over various environments with dissimilar conditions revealed the effectiveness of the architecture in improving the lifetime of the network as well as preserving the video quality.

18.
Sensors (Basel) ; 8(2): 1099-1110, 2008 Feb 21.
Article in English | MEDLINE | ID: mdl-27879755

ABSTRACT

A wireless sensor/actuator network (WSAN) is a group of sensors and actuators that are geographically distributed and interconnected by wireless networks. Sensors gather information about the state of physical world. Actuators react to this information by performing appropriate actions. WSANs thus enable cyber systems to monitor and manipulate the behavior of the physical world. WSANs are growing at a tremendous pace, just like the exploding evolution of Internet. Supporting quality of service (QoS) will be of critical importance for pervasive WSANs that serve as the network infrastructure of diverse applications. To spark new research and development interests in this field, this paper examines and discusses the requirements, critical challenges, and open research issues on QoS management in WSANs. A brief overview of recent progress is given.

19.
Article in Chinese | WPRIM (Western Pacific) | ID: wpr-583993

ABSTRACT

This paper introduces some information of the infusion tele-control system based on LonWorks, including its system function, operation principle, software and hardware designs. With high reliability, low cost and convenient operation, this system has a bright future in the market and its application.

20.
Article in Chinese | WPRIM (Western Pacific) | ID: wpr-583910

ABSTRACT

This paper introduces some information of the multi-function hydraulic pressure diagnostic and therapeutic instrument, which is applied to the diagnoses and treatments of oviduct, matrix, urethra, bladder and bile duct, including its system function, operation principle, software and hardware designs. Being reliable, cheap, convenient and multipurpose, the instrument has a bright future in the market.

SELECTION OF CITATIONS
SEARCH DETAIL
...