Nothing Special   »   [go: up one dir, main page]

You seem to have javascript disabled. Please note that many of the page functionalities won't work as expected without javascript enabled.
 
 
Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

remove_circle_outline
remove_circle_outline
remove_circle_outline

Search Results (332)

Search Parameters:
Keywords = middleware

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
37 pages, 3343 KiB  
Review
Quantum Computing: Navigating the Future of Computation, Challenges, and Technological Breakthroughs
by Qurban A. Memon, Mahmoud Al Ahmad and Michael Pecht
Quantum Rep. 2024, 6(4), 627-663; https://doi.org/10.3390/quantum6040039 - 16 Nov 2024
Viewed by 952
Abstract
Quantum computing stands at the precipice of technological revolution, promising unprecedented computational capabilities to tackle some of humanity’s most complex problems. The field is highly collaborative and recent developments such as superconducting qubits with increased scaling, reduced error rates, and improved cryogenic infrastructure, [...] Read more.
Quantum computing stands at the precipice of technological revolution, promising unprecedented computational capabilities to tackle some of humanity’s most complex problems. The field is highly collaborative and recent developments such as superconducting qubits with increased scaling, reduced error rates, and improved cryogenic infrastructure, trapped-ion qubits with high-fidelity gates and reduced control hardware complexity, and photonic qubits with exploring room-temperature quantum computing are some of the key developments pushing the field closer to demonstrating real-world applications. However, the path to realizing this promise is fraught with significant obstacles across several key platforms, including sensitivity to errors, decoherence, scalability, and the need for new materials and technologies. Through an exploration of various quantum systems, this paper highlights both the potential and the challenges of quantum computing and discusses the essential role of middleware, quantum hardware development, and the strategic investments required to propel the field forward. With a focus on overcoming technical hurdles through innovation and interdisciplinary research, this review underscores the transformative impact quantum computing could have across diverse sectors. Full article
Show Figures

Figure 1

Figure 1
<p>Time plot of current advances in classical computing power.</p>
Full article ">Figure 2
<p>Classical computing bit vs. qubit (can exist in both states).</p>
Full article ">Figure 3
<p>Various qubits and their pros and cons.</p>
Full article ">Figure 4
<p>A quantum processing unit suspended beneath refrigeration setup, maintaining the processor at ultracold temperatures necessary for its operation source: <a href="https://www.research.ibm.com/ibm-q/network/" target="_blank">https://www.research.ibm.com/ibm-q/network/</a> (accessed on 1 April 2024).</p>
Full article ">Figure 5
<p>Challenges faced by quantum computing.</p>
Full article ">Figure 6
<p>Illustration of quantum decoherence.</p>
Full article ">Figure 7
<p>Surface code for error correction.</p>
Full article ">Figure 8
<p>Algorithm qubit timeline by the end of the current decade.</p>
Full article ">Figure 9
<p>Quantum computer attack on public key cryptography.</p>
Full article ">Figure 10
<p>Environmental considerations in quantum computing.</p>
Full article ">Figure 11
<p>Quantum computing’s impact on the future.</p>
Full article ">Figure 12
<p>QC business application development timescale.</p>
Full article ">Figure 13
<p>Vendor prototype roadmaps. Legend: Vendor (physical qubits).</p>
Full article ">Figure 14
<p>Quantum initiative funding by country (2014–2030).</p>
Full article ">Figure 15
<p>Quantum computing market growth projections.</p>
Full article ">
12 pages, 848 KiB  
Article
R-RDSP: Reliable and Rapidly Deployable Wireless Ad Hoc System for Post-Disaster Management over DDS
by Baber Jan, Adnan Munir, Ayaz H. Khan, Ajmal Khan and Basem Al-Madani
Sensors 2024, 24(22), 7259; https://doi.org/10.3390/s24227259 - 13 Nov 2024
Viewed by 425
Abstract
After natural disasters such as earthquakes, floods, or wars occur, cellular communication networks often sustain significant damage or become impaired. In these critical situations, first responders must coordinate with other rescue teams to communicate essential information to central command and survivors. To address [...] Read more.
After natural disasters such as earthquakes, floods, or wars occur, cellular communication networks often sustain significant damage or become impaired. In these critical situations, first responders must coordinate with other rescue teams to communicate essential information to central command and survivors. To address this challenge, we have developed a reliable and rapidly deployable wireless ad hoc system for post-disaster management using Data Distribution Service (DDS) middleware, specifically RTI-DDS, named R-RDSP. The R-RDSP further enhances these metrics, achieving a 14.5% improvement in end-to-end delay and a 20.24% improvement in round-trip delay over the RDSP scheme. The R-RDSP system consists of three main modules: client, relay, and server. Each module connects to others via an ad hoc network, ensuring direct device-to-device communication without relying on existing infrastructure. The client module collects and sends the victim’s location and emergency messages. The relay modules forward these messages across the ad hoc networks, ensuring minimal delay and high reliability. Finally, the server module receives the messages, processes them, and coordinates the response. Leveraging RTI-DDS for reliable message distribution, the system demonstrates robust performance even under challenging network conditions. Full article
(This article belongs to the Special Issue Smart City Alert: Systems for Prevention and Detection of Disasters)
Show Figures

Figure 1

Figure 1
<p>DDS Architecture.</p>
Full article ">Figure 2
<p>Architectural Flowchart of the Disaster Management System.</p>
Full article ">Figure 3
<p>Deployment Scenario of R-RDSP. The paths represented in the scenario are: Path 1 (C - Y - X - S), Path 2 (C - N - Z - X - S), Path 3 (C - N - Z - S), Path 4 (C - N - Z - P - S), and Path 5 (C - R - Q - P - S).</p>
Full article ">Figure 4
<p>The total distance covered by relay devices.</p>
Full article ">Figure 5
<p>End-to-end delay comparison between R-RDSP and RDSP.</p>
Full article ">Figure 6
<p>Round-trip delay comparison between R-RDSP and RDSP.</p>
Full article ">
21 pages, 5677 KiB  
Article
Large Language Model and Digital Twins Empowered Asynchronous Federated Learning for Secure Data Sharing in Intelligent Labeling
by Xuanzhu Sheng, Chao Yu, Xiaolong Cui and Yang Zhou
Mathematics 2024, 12(22), 3550; https://doi.org/10.3390/math12223550 - 13 Nov 2024
Viewed by 432
Abstract
With the advancement of the large language model (LLM), the demand for data labeling services has increased dramatically. Big models are inseparable from high-quality, specialized scene data, from training to deploying application iterations to landing generation. However, how to achieve intelligent labeling consistency [...] Read more.
With the advancement of the large language model (LLM), the demand for data labeling services has increased dramatically. Big models are inseparable from high-quality, specialized scene data, from training to deploying application iterations to landing generation. However, how to achieve intelligent labeling consistency and accuracy and improve labeling efficiency in distributed data middleware scenarios is the main difficulty in enhancing the quality of labeled data at present. In this paper, we proposed an asynchronous federated learning optimization method based on the combination of LLM and digital twin technology. By analysising and comparing and with other existing asynchronous federated learning algorithms, the experimental results show that our proposed method outperforms other algorithms in terms of performance, such as model accuracy and running time. The experimental validation results show that our proposed method has good performance compared with other algorithms in the process of intelligent labeling both in terms of accuracy and running solves the consistency and accuracy problems of intelligent labeling in a distributed data center. Full article
(This article belongs to the Special Issue Advanced Control of Complex Dynamical Systems with Applications)
Show Figures

Figure 1

Figure 1
<p>Architecture of a Distributed Intelligent Annotation System Based on the Combination of Big Model and Digital Twin.</p>
Full article ">Figure 2
<p>Framework Diagram of Local Intelligent Marking Model Combining Digital Twin Model and Large Model.</p>
Full article ">Figure 3
<p>The diagram of the proposed method.</p>
Full article ">Figure 4
<p>Diagram of data sharing process.</p>
Full article ">Figure 5
<p>(<b>a</b>–<b>c</b>) shows a comparison of the accuracy of the model’s six algorithms for different individuals involved in the intelligent labeling model.</p>
Full article ">Figure 6
<p>(<b>a</b>–<b>c</b>) shows a comparison of the accuracy of the four algorithms of the model for different degrees of heterogeneity.</p>
Full article ">Figure 6 Cont.
<p>(<b>a</b>–<b>c</b>) shows a comparison of the accuracy of the four algorithms of the model for different degrees of heterogeneity.</p>
Full article ">Figure 7
<p>This figure represents the running time of each algorithm with different numbers of participants.</p>
Full article ">Figure 8
<p>The figure represents the average training runtime of different algorithms at the level of intrusion.</p>
Full article ">Figure 8 Cont.
<p>The figure represents the average training runtime of different algorithms at the level of intrusion.</p>
Full article ">
18 pages, 3552 KiB  
Article
A Secure Auditable Remote Registry Pattern for IoT Systems
by Antonio Maña, Francisco J. Jaime and Lucía Gutiérrez
Future Internet 2024, 16(11), 405; https://doi.org/10.3390/fi16110405 - 4 Nov 2024
Viewed by 381
Abstract
In software engineering, pattern papers serve the purpose of providing a description of a generalized, reusable solution to recurring design problems, based on practical experience and established best practices. This paper presents an architectural pattern for a Secure Auditable Registry service based on [...] Read more.
In software engineering, pattern papers serve the purpose of providing a description of a generalized, reusable solution to recurring design problems, based on practical experience and established best practices. This paper presents an architectural pattern for a Secure Auditable Registry service based on Message-Oriented Middleware to be used in large-scale IoT systems that must provide auditing capabilities to external entities. To prepare the pattern, the direct experience in applying the pattern solution in an industry-funded R&D project has been a key aspect because it has allowed us to gain a deep understanding of the problem and the solution, and it has contributed to the correctness and real-world applicability of the pattern as described. To further improve the quality of the paper, we have followed the commonly accepted practices in pattern development (including peer reviews) to ensure that the core aspects of the solution are correctly represented and that the description allows it to be applicable to similar problems in other domains, such as healthcare, autonomous devices, banking, food tracing or manufacturing to name a few. The work done in applying this pattern confirms that it solves a recurring problem for IoT systems, but also that it can be adopted in other domains, providing an effective solution in order to achieve enhancement of the auditability capabilities of the target systems. This pattern will be part of a pattern language (i.e., a family of related patterns) that we are developing for transitioning from legacy systems to IoT with an emphasis on security. Full article
(This article belongs to the Special Issue Cybersecurity in the IoT)
Show Figures

Figure 1

Figure 1
<p>Architecture of a Message-Oriented Middleware (MOM).</p>
Full article ">Figure 2
<p>Pattern diagram relating the new pattern with other IoT-relevant patterns.</p>
Full article ">Figure 3
<p>Architecture of SUDs that may use the <span class="html-small-caps">SARMOM</span> pattern.</p>
Full article ">Figure 4
<p>Secure Tropos diagram describing the goals of a typical SUD that may use the <span class="html-small-caps">SARMOM</span> pattern.</p>
Full article ">Figure 5
<p>System architecture after applying the <span class="html-small-caps">SARMOM</span> pattern.</p>
Full article ">
12 pages, 1513 KiB  
Article
Emotion-Recognition System for Smart Environments Using Acoustic Information (ERSSE)
by Gabriela Santiago, Jose Aguilar and Rodrigo García
Information 2024, 15(11), 677; https://doi.org/10.3390/info15110677 - 30 Oct 2024
Viewed by 552
Abstract
Acoustic management is very important for detecting possible events in the context of a smart environment (SE). In previous works, we proposed a reflective middleware for acoustic management (ReM-AM) and its autonomic cycles of data analysis tasks, along with its ontology-driven architecture. In [...] Read more.
Acoustic management is very important for detecting possible events in the context of a smart environment (SE). In previous works, we proposed a reflective middleware for acoustic management (ReM-AM) and its autonomic cycles of data analysis tasks, along with its ontology-driven architecture. In this work, we aim to develop an emotion-recognition system for ReM-AM that uses sound events, rather than speech, as its main focus. The system is based on a sound pattern for emotion recognition and the autonomic cycle of intelligent sound analysis (ISA), defined by three tasks: variable extraction, sound data analysis, and emotion recommendation. We include a case study to test our emotion-recognition system in a simulation of a smart movie theater, with different situations taking place. The implementation and verification of the tasks show a promising performance in the case study, with 80% accuracy in sound recognition, and its general behavior shows that it can contribute to improving the well-being of the people present in the environment. Full article
(This article belongs to the Section Artificial Intelligence)
Show Figures

Figure 1

Figure 1
<p>ReM-AM (from [<a href="#B13-information-15-00677" class="html-bibr">13</a>]).</p>
Full article ">Figure 2
<p>CIM layer (from Ref. [<a href="#B16-information-15-00677" class="html-bibr">16</a>]).</p>
Full article ">Figure 3
<p>PIM layer (from Ref. [<a href="#B16-information-15-00677" class="html-bibr">16</a>]).</p>
Full article ">Figure 4
<p>Diagram of the Autonomic Cycle ISA for ERSSE.</p>
Full article ">Figure 5
<p>Simple interface.</p>
Full article ">
38 pages, 970 KiB  
Article
A Survey of Middleware Adoption in Nonprofit Sectors: A Sustainable Development Perspective
by Basem Almadani, Sarah Alissa, Reem Alshareef, Farouq Aliyu and Esam Al-Nahari
Sustainability 2024, 16(20), 8904; https://doi.org/10.3390/su16208904 - 14 Oct 2024
Viewed by 685
Abstract
Nonprofit Organizations (NPOs) are adopting technology to improve their quality of services, scale up, or reduce operation costs. However, due to the heterogeneity of systems they use, NPOs face system-integration challenges when collaborating with other organizations. Middleware is an intermediary software that assists [...] Read more.
Nonprofit Organizations (NPOs) are adopting technology to improve their quality of services, scale up, or reduce operation costs. However, due to the heterogeneity of systems they use, NPOs face system-integration challenges when collaborating with other organizations. Middleware is an intermediary software that assists dissimilar systems in working together. This paper explores middleware applications, opportunities, and challenges within the sector. It extensively reviewed the current state of research on middleware usage in the nonprofit sector for all papers published in Scopus and Web of Science (WoS) until 2023. Out of 127 papers returned, only 31 remained after removing duplicates, invalid entries, and out-of-scope publications. Then, we synthesized insights from a thorough survey of these selected papers. In light of the survey results, we observed that NPOs primarily use middleware in a few of the Sustainable Development Goals (SDGs), namely, health (SDG 3), NPO operations (SDG 8 and 9), NPO collaborations (SDG 17), development of sustainable cities (SDG 11), security and disaster management (SDG 16), and education (SDG 4). We also identified several challenges related to using middleware in the nonprofit sector, which include privacy, security, system development and performance, data processing and transfer, and volunteer attrition. Full article
Show Figures

Figure 1

Figure 1
<p>Operation mechanism of a typical middleware.</p>
Full article ">Figure 2
<p>Annual publications and citations on middleware in the nonprofit sector.</p>
Full article ">Figure 3
<p>PRISMA dataflow diagram for this survey.</p>
Full article ">Figure 4
<p>Top-level architecture of a middleware.</p>
Full article ">Figure 5
<p>Middleware taxonomy.</p>
Full article ">Figure 6
<p>VOSviewer maps for the publications in middleware for nonprofit sector.</p>
Full article ">Figure 7
<p>VOSviewer maps for the papers in middleware for nonprofit sector according to SDGs.</p>
Full article ">Figure 8
<p>Taxonomy of applications of middleware in the nonprofit sector.</p>
Full article ">
22 pages, 5463 KiB  
Article
A ROS2-Based Gateway for Modular Hardware Usage in Heterogeneous Environments
by Rúben Carreira, Nuno Costa, João Ramos, Luís Frazão and António Pereira
Sensors 2024, 24(19), 6341; https://doi.org/10.3390/s24196341 - 30 Sep 2024
Viewed by 689
Abstract
The rise of robotics and the Internet of Things (IoT) could potentially represent a significant shift towards a more integrated and automated future, where the physical and digital domains may merge. However, the integration of these technologies presents certain challenges, including compatibility issues [...] Read more.
The rise of robotics and the Internet of Things (IoT) could potentially represent a significant shift towards a more integrated and automated future, where the physical and digital domains may merge. However, the integration of these technologies presents certain challenges, including compatibility issues with existing systems and the need for greater interoperability between different devices. It would seem that the rigidity of traditional robotic designs may inadvertently make these difficulties worse, which in turn highlights the potential benefits of modular solutions. Furthermore, the mastery of new technologies may introduce additional complexity due to the varying approaches taken by robot manufacturers. In order to address these issues, this research proposes a Robot Operating System (ROS2)-based middleware, called the “ROS2-based gateway”, which aims to simplify the integration of robots in different environments. By focusing on the payload layer and enabling external communication, this middleware has the potential to enhance modularity and interoperability, thus accelerating the integration process. It offers users the option of selecting payloads and communication methods via a shell interface, which the middleware then configures, ensuring adaptability. The solution proposed in this article, based on the gateway concept, offers users and programmers the flexibility to specify which payloads they want to activate depending on the task at hand and the high-level protocols they wish to use to interact with the activated payloads. This approach allows for the optimisation of hardware resources (only the necessary payloads are activated), as well as enabling the programmer/user to utilise high-level communication protocols (such as RESTful, Kafka, etc.) to interact with the activated payloads, rather than low-level programming. Full article
(This article belongs to the Section Sensors and Robotics)
Show Figures

Figure 1

Figure 1
<p>Solution’s workflow.</p>
Full article ">Figure 2
<p>Gateway’s architecture.</p>
Full article ">Figure 3
<p>ROS2-based gateway architecture exemplifying a use case.</p>
Full article ">Figure 4
<p>ROS2 Launch file flow diagram.</p>
Full article ">Figure 5
<p>ROS2 Arm received messages logic.</p>
Full article ">Figure 6
<p>User input for the select and interact with payloads test case.</p>
Full article ">Figure 7
<p>MQTT broker showing a new connection.</p>
Full article ">Figure 8
<p>Output of the connection guide regarding the user’s choices.</p>
Full article ">Figure 9
<p>Using MQTTX to publish arm control messages.</p>
Full article ">Figure 10
<p>Using MQTTX to subscribe to the arm guide topic.</p>
Full article ">Figure 11
<p>UI showing the payloads and technologies selection process.</p>
Full article ">Figure 12
<p>UI showing the connection settings provided by the user.</p>
Full article ">Figure 13
<p>Usage of MQTTX to test the MQTT communication.</p>
Full article ">Figure 14
<p>Usage of Postman to test the Websockets communication.</p>
Full article ">Figure 15
<p>Usage of a python script to test the Kafka communication.</p>
Full article ">Figure 16
<p>Web page receiving the camera stream and controlling the robotic arm through websockets.</p>
Full article ">Figure 17
<p>The robot arm reaching the target object controlled from the client web page.</p>
Full article ">Figure 18
<p>ROS2-based The robot being remotely controlled through websockets.</p>
Full article ">Figure 19
<p>The camera detecting oranges and the arm moving onto each one.</p>
Full article ">
28 pages, 2513 KiB  
Article
ROS Gateway: Enhancing ROS Availability across Multiple Network Environments
by Byoung-Youl Song and Hoon Choi
Sensors 2024, 24(19), 6297; https://doi.org/10.3390/s24196297 - 29 Sep 2024
Viewed by 641
Abstract
As the adoption of large-scale model-based AI grows, the field of robotics is undergoing significant changes. The emergence of cloud robotics, where advanced tasks are offloaded to fog or cloud servers, is gaining attention. However, the widely used Robot Operating System (ROS) does [...] Read more.
As the adoption of large-scale model-based AI grows, the field of robotics is undergoing significant changes. The emergence of cloud robotics, where advanced tasks are offloaded to fog or cloud servers, is gaining attention. However, the widely used Robot Operating System (ROS) does not support communication between robot software across different networks. This paper introduces ROS Gateway, a middleware designed to improve the usability and extend the communication range of ROS in multi-network environments, which is important for processing sensor data in cloud robotics. We detail its structure, protocols, and algorithms, highlighting improvements over traditional ROS configurations. The ROS Gateway efficiently handles high-volume data from advanced sensors such as depth cameras and LiDAR, ensuring reliable transmission. Based on the rosbridge protocol and implemented in Python 3, ROS Gateway is compatible with rosbridge-based tools and runs on both x86 and ARM-based Linux environments. Our experiments show that the ROS Gateway significantly improves performance metrics such as topic rate and delay compared to standard ROS setups. We also provide predictive formulas for topic receive rates to guide the design and deployment of robotic applications using ROS Gateway, supporting performance estimation and system optimization. These enhancements are essential for developing responsive and intelligent robotic systems in dynamic environments. Full article
(This article belongs to the Section Sensors and Robotics)
Show Figures

Figure 1

Figure 1
<p>Example of a ROS-Based robotic application in cloud or fog Configuration. Subnet <math display="inline"><semantics> <mi>α</mi> </semantics></math> is a subnet to which multiple hosts that constitute cloud or fog computing are connected. Subnet <math display="inline"><semantics> <mi>β</mi> </semantics></math> is a subnet to which robots are connected, or a local host network within the robot. Subnet <math display="inline"><semantics> <mi>γ</mi> </semantics></math> is a subnet to which a control system consisting of multiple hosts in a remote location is connected, though not a subnet in which robots are included.</p>
Full article ">Figure 2
<p>The Gateway architecture. * The Client Worker is activated when a configuration that enables connectivity to a gateway in a different network is applied. ** Server Workers are initially created with a single process for receiving commands from external sources. Subsequently, a new process is assigned based on the client that establishes a connection.</p>
Full article ">Figure 3
<p>Comparison of ROS topic transmission rates for different configurations: The configurations include the use of ROS on a single device (<span class="html-italic">ros2-localhost</span>) and local subnet (<span class="html-italic">ros2-subnet</span>), the use of the Gateway on separate networks (<span class="html-italic">Gateway-pub-json, Gateway-sub-json, Gateway-sub-raw</span>), and the use of rosbridge on separate networks (<span class="html-italic">rosbridge-pub-json, rosbridge-sub-json, rosbridge-sub-raw</span>). The best performance for each configuration is plotted, with error bars representing the worst performance. Higher values indicate superior performance.</p>
Full article ">Figure 4
<p>Comparison of ROS topic transmission delay for different configurations: The configurations include the use of ROS on a single device (<span class="html-italic">ros2-localhost</span>) and local subnet (<span class="html-italic">ros2-subnet</span>), the use of the Gateway on separate networks (<span class="html-italic">Gateway-pub-json, Gateway-sub-json, Gateway-sub-raw</span>), and the use of rosbridge on separate networks (<span class="html-italic">rosbridge-pub-json, rosbridge-sub-json, rosbridge-sub-raw</span>). A log scale is used to illustrate the delay values. The minimum delay for each configuration is plotted, and the error bars represent the maximum delay. Lower values indicate better performance. The horizontal dashed lines on the graph represent the real-time limit delay at each occurrence rate.</p>
Full article ">Figure 5
<p>Observed topic rates by Gateway configurations and sensor publishing rates: The configurations include the use of ROS on a single device (<span class="html-italic">ros2-localhost</span>) and local subnet (<span class="html-italic">ros2-subnet</span>), as well as the use of the Gateway on each option. The best performance for each configuration is plotted, with error bars representing the worst performance. Higher values indicate superior performance.</p>
Full article ">Figure 6
<p>Observed topic delays by Gateway configurations and sensor publishing rates: The configurations include the use of ROS on a single device (<span class="html-italic">ros2-localhost</span>) and local subnet (<span class="html-italic">ros2-subnet</span>), as well as the use of the Gateway on each option. A log scale is used to illustrate the delay values. The minimum delay for each configuration is plotted, and the error bars represent the maximum delay. Lower values indicate better performance. The horizontal dashed lines on the graph represent the real-time limit delay at each occurrence rate.</p>
Full article ">Figure A1
<p>Topic task sequence diagram.</p>
Full article ">Figure A2
<p>Service task sequence diagram.</p>
Full article ">Figure A3
<p>Action task sequence diagram.</p>
Full article ">
17 pages, 2297 KiB  
Article
Context-Driven Service Deployment Using Likelihood-Based Approach for Internet of Things Scenarios
by Nandan Banerji, Chayan Paul, Bikash Debnath, Biplab Das, Gurpreet Singh Chhabra, Bhabendu Kumar Mohanta and Ali Ismail Awad
Future Internet 2024, 16(10), 349; https://doi.org/10.3390/fi16100349 - 25 Sep 2024
Viewed by 662
Abstract
In a context-aware Internet of Things (IoT) environment, the functional contexts of devices and users will change over time depending on their service consumption. Each iteration of an IoT middleware algorithm will also encounter changes occurring in the contexts due to the joining/leaving [...] Read more.
In a context-aware Internet of Things (IoT) environment, the functional contexts of devices and users will change over time depending on their service consumption. Each iteration of an IoT middleware algorithm will also encounter changes occurring in the contexts due to the joining/leaving of new/old members; this is the inherent nature of ad hoc IoT scenarios. Individual users will have notable preferences in their service consumption patterns; by leveraging these patterns, the approach presented in this article focuses on how these changes impact performance due to functional-context switching over time. This is based on the idea that consumption patterns will exhibit certain time-variant correlations. The maximum likelihood estimation (MLE) is used in the proposed approach to capture the impact of these correlations and study them in depth. The results of this study reveal how the correlation probabilities and the system performance change over time; this also aids with the construction of the boundaries of certain time-variant correlations in users’ consumption patterns. In the proposed approach, the information gleaned from the MLE is used in arranging the service information within a distributed service registry based on users’ service usage preferences. Practical simulations were conducted over small (100 nodes), medium (1000 nodes), and relatively larger (10,000 nodes) networks. It was found that the approach described helps to reduce service discovery time and can improve the performance in service-oriented IoT scenarios. Full article
Show Figures

Figure 1

Figure 1
<p>The overlapping functional-context networks.</p>
Full article ">Figure 2
<p>System flow diagram.</p>
Full article ">Figure 3
<p>Basic network model shows six nodes (<math display="inline"><semantics> <msub> <mi>N</mi> <mn>1</mn> </msub> </semantics></math> to <math display="inline"><semantics> <msub> <mi>N</mi> <mn>6</mn> </msub> </semantics></math>), and each is associated with a finite cache sketched as a rectangular box.</p>
Full article ">Figure 4
<p>The continuous domain is divided into a set of regular intervals of <span class="html-italic">T</span> time units.</p>
Full article ">Figure 5
<p>Changing contexts of nodes.</p>
Full article ">Figure 6
<p>Different possible service consumption variations.</p>
Full article ">Figure 7
<p>Plots of average consumption probability for services with different consumption likelihoods over 100 service consumption requests.</p>
Full article ">Figure 8
<p>Plots of average consumption probability for services with different consumption likelihoods over 1000 service consumption requests.</p>
Full article ">Figure 9
<p>Plots of average consumption probability for services with different consumption likelihoods over 10,000 service consumption requests.</p>
Full article ">Figure 10
<p>Comparison of service-search latency.</p>
Full article ">
20 pages, 3288 KiB  
Article
Task Scheduling Algorithm for Power Minimization in Low-Cost Disaster Monitoring System: A Heuristic Approach
by Chanankorn Jandaeng , Jongsuk Kongsen , Peeravit Koad, May Thu and Sirirat Somchuea
J. Sens. Actuator Netw. 2024, 13(5), 59; https://doi.org/10.3390/jsan13050059 - 24 Sep 2024
Viewed by 715
Abstract
This study investigates the optimization of a low-cost IoT-based weather station designed for disaster monitoring, focusing on minimizing power consumption. The system architecture includes application, middleware, communication, and sensor layers, with solar power as the primary energy source. A novel task scheduling algorithm [...] Read more.
This study investigates the optimization of a low-cost IoT-based weather station designed for disaster monitoring, focusing on minimizing power consumption. The system architecture includes application, middleware, communication, and sensor layers, with solar power as the primary energy source. A novel task scheduling algorithm was developed to reduce power usage by efficiently managing the sensing and data transmission periods. Experiments compared the energy consumption of polling and deep sleep techniques, revealing that deep sleep is more energy-efficient (4.73% at 15 s time intervals and 16.45% at 150 s time intervals). Current consumption was analyzed across different test scenarios, confirming that efficient task scheduling significantly reduces power consumption. The energy consumption models were developed to quantify power usage during the sensing and transmission phases. This study concludes that the proposed system, utilizing affordable hardware and solar power, is an effective and sustainable solution for disaster monitoring. Despite using non-low-power devices, the results demonstrate the importance of adaptive task scheduling in extending the operational life of IoT devices. Future work will focus on implementing dynamic scheduling and low-power routing algorithms to enhance system functionality in resource-constrained environments. Full article
Show Figures

Figure 1

Figure 1
<p>The power consumption of the node.</p>
Full article ">Figure 2
<p>The system architecture of the IoT weather station. The data line is represented with the dotted line to turn the network module on/off via relay.</p>
Full article ">Figure 3
<p>The low-cost disaster monitoring system and its peripheral sensor.</p>
Full article ">Figure 4
<p>The sequence diagram of the software architecture.</p>
Full article ">Figure 5
<p>The sequence diagram of the software architecture.</p>
Full article ">Figure 6
<p>Current consumption of all test cases.</p>
Full article ">Figure 7
<p>The average current consumption (A) for 40 rounds per interval.</p>
Full article ">Figure 8
<p>The power source estimation of the proposed system.</p>
Full article ">
20 pages, 2810 KiB  
Article
A Comprehensive Security Framework for Asymmetrical IoT Network Environments to Monitor and Classify Cyberattack via Machine Learning
by Ali Alqahtani, Abdulaziz A. Alsulami, Nayef Alqahtani, Badraddin Alturki and Bandar M. Alghamdi
Symmetry 2024, 16(9), 1121; https://doi.org/10.3390/sym16091121 - 29 Aug 2024
Viewed by 899
Abstract
The Internet of Things (IoT) is an important component of the smart environment, which produces a large volume of data that is considered challenging to handle. In addition, the IoT architecture is vulnerable to many cyberattacks that can target operational devices. Therefore, there [...] Read more.
The Internet of Things (IoT) is an important component of the smart environment, which produces a large volume of data that is considered challenging to handle. In addition, the IoT architecture is vulnerable to many cyberattacks that can target operational devices. Therefore, there is a need for monitoring IoT traffic to analyze, detect malicious activity, and classify cyberattack types. This research proposes a security framework to monitor asymmetrical network traffic in an IoT environment. The framework offers a network intrusion detection system (NIDS) to detect and classify cyberattacks, implemented using a machine learning (ML) model residing in the middleware layer of the IoT architecture. A dimensionality reduction technique known as principal component analysis (PCA) is utilized to facilitate data transmission, which is intended to be sent from the middleware layer to the cloud layer with reduced complexity and fewer unnecessary inputs without compromising the information content. Therefore, the reduced IoT traffic data are sent to the cloud and the PCA data are retransformed to approximate the original data for visualizing the IoT traffic. The NIDS is responsible for reporting the attack type to the cloud in the event of an attack. Our findings indicate that the proposed framework has promising results in classifying the attack type, which achieved a classification accuracy of 98%. In addition, the dimension of the IoT traffic data is reduced by around 50% and it has a similarity of around 90% compared to the original data. Full article
(This article belongs to the Section Computer)
Show Figures

Figure 1

Figure 1
<p>IoT general architecture.</p>
Full article ">Figure 2
<p>The proposed IoT security framework.</p>
Full article ">Figure 3
<p>Original dataset distribution.</p>
Full article ">Figure 4
<p>Randomly selected samples from original dataset.</p>
Full article ">Figure 5
<p>Procedure for computing PCs.</p>
Full article ">Figure 6
<p>Similarity calculation.</p>
Full article ">Figure 7
<p>Test accuracy.</p>
Full article ">Figure 8
<p>ThingSpeak dashboard.</p>
Full article ">
41 pages, 13625 KiB  
Article
Horizontally Scalable Implementation of a Distributed DBMS Delivering Causal Consistency via the Actor Model
by Carl Camilleri, Joseph G. Vella and Vitezslav Nezval
Electronics 2024, 13(17), 3367; https://doi.org/10.3390/electronics13173367 - 24 Aug 2024
Viewed by 749
Abstract
Causal Consistency has been proven to be the strongest type of consistency that can be achieved in a fault-tolerant, distributed system. This paper describes an implementation of D-Thespis, which is an approach that employs the actor mathematical model of concurrent computation to establish [...] Read more.
Causal Consistency has been proven to be the strongest type of consistency that can be achieved in a fault-tolerant, distributed system. This paper describes an implementation of D-Thespis, which is an approach that employs the actor mathematical model of concurrent computation to establish a distributed middleware that enforces causal consistency on a widely used relational database management system (RDBMS). D-Thespis prioritises developer experience by encapsulating the intricacies of causal consistency behind an interface that is accessible over standard REST protocol. Here, we discuss several novel results. Firstly, we define a method that builds a causally consistent DBMS supporting elastic horizontal scalability. Secondly, we deliver a cloud-native implementation of the middleware and provide results and insights on 6804 benchmark configurations executed on our implementation while running on a public cloud infrastructure across several data centres. The evaluation concerns transaction processing performance, an evaluation of our implementation’s update visibility latency, and a memory profiling exercise. The results of our evaluation show that under a transactional workload, a single-node installation of our implementation of D-Thespis is 1.5 times faster than a relational DBMS running serialisable transaction processing, while the performance of the middleware can improve by more than three times when scaled horizontally within the same data centre. Our study of the memory profile of the D-Thespis implementation shows that the system distributes its memory requirements evenly across all the available machines, as it is scaled horizontally. Finally, we also illustrate how our middleware propagates data changes across geographically-distributed infrastructures in a timely manner: our tests show that most of the effects of data change operations in one data centre are available in a remote data centre within less than 300 ms over and above the network round trip latency between the two data centres. Full article
(This article belongs to the Special Issue Advances in Cloud and Distributed System Applications)
Show Figures

Figure 1

Figure 1
<p>System Model of Thespis: A middleware delivering causal consistency over an RDBMS using the actor model.</p>
Full article ">Figure 2
<p>Conceptual Architecture of D-Thespis.</p>
Full article ">Figure 3
<p>Conceptual Architecture of D-Thespis: Intra-Data Centre Horizontal Scalability.</p>
Full article ">Figure 4
<p>Conceptual Architecture of D-Thespis: Single-node configuration within a data centre.</p>
Full article ">Figure 5
<p>D-Thespis architecture based on concepts of the “Clean Architecture” <a href="https://blog.cleancoder.com/uncle-bob/2012/08/13/the-clean-architecture.html" target="_blank">https://blog.cleancoder.com/uncle-bob/2012/08/13/the-clean-architecture.html</a> (accessed on 20 February 2024).</p>
Full article ">Figure 6
<p>Event log storage using one Redis list per data entity in D-Thespis.</p>
Full article ">Figure 7
<p>D-Thespis Performance Evaluation Infrastructure.</p>
Full article ">Figure 8
<p>Output of the Zipfian workload generator in the YCSB as customised for D-Thespis for the top 50 values during a run.</p>
Full article ">Figure 9
<p>Results of D-Thespis SUTs <tt><b>DT_3S_1DC_O</b></tt> and <tt><b>DB_3S_1DC</b></tt> (85% READ, 15% WRITE).</p>
Full article ">Figure 10
<p>Results of D-Thespis SUTs <tt><b>DT_5S_1DC_O</b></tt> and <tt><b>DB_5S_1DC</b></tt> (65% READ, 35% WRITE).</p>
Full article ">Figure 11
<p>Results of D-Thespis SUTs <tt><b>DT_1S_1DC_O</b></tt> and <tt><b>DB_1S_1DC</b></tt> (65% READ, 35% WRITE).</p>
Full article ">Figure 12
<p>Percentage difference in average throughput for SUT <tt><b>DT_5S_1DC_O</b></tt> vs. <tt><b>DB_5S_1DC</b></tt>.</p>
Full article ">Figure 13
<p>Percentage difference in average throughput for SUT <tt><b>DT_3S_1DC_O</b></tt> vs. <tt><b>DB_3S_1DC</b></tt>.</p>
Full article ">Figure 14
<p>Percentage difference in average throughput for SUT <tt><b>DT_2S_1DC_O</b></tt> vs. <tt><b>DB_2S_1DC</b></tt>.</p>
Full article ">Figure 15
<p>Percentage difference in average throughput for SUT <tt><b>DT_1S_1DC_O</b></tt> vs. <tt><b>DB_1S_1DC</b></tt>.</p>
Full article ">Figure 16
<p>Percentage difference in average throughput for SUT <tt><b>DT_1S_1DC_A</b></tt> vs. <tt><b>DB_1S_1DC</b></tt>.</p>
Full article ">Figure 17
<p>Percentage difference in average throughput for SUT <tt><b>DT_5S_1DC_O</b></tt> vs. <tt><b>DT_1S_1DC_A</b></tt>.</p>
Full article ">Figure 18
<p>Percentage difference in average throughput for SUT <tt><b>DT_3S_1DC_O</b></tt> vs. <tt><b>DT_1S_1DC_A</b></tt>.</p>
Full article ">Figure 19
<p>Percentage difference in average throughput for SUT <tt><b>DT_2S_1DC_O</b></tt> vs. <tt><b>DT_1S_1DC_A</b></tt>.</p>
Full article ">Figure 20
<p>D-Thespis update visibility latency for events generated by 30 virtual users.</p>
Full article ">Figure 21
<p>D-Thespis update visibility latency for events generated by 60 virtual users.</p>
Full article ">Figure 22
<p>D-Thespis Memory Footprint: Memory usage in GKE for 1 workload (<b>top</b>) and total for 2 workloads (<b>bottom</b>).</p>
Full article ">
17 pages, 9327 KiB  
Article
Supply-Blockchain Functional Prototype for Optimizing Port Operations Using Hyperledger Fabric
by Bidah Alkhaldi and Alauddin Al-Omary
Blockchains 2024, 2(3), 217-233; https://doi.org/10.3390/blockchains2030011 - 11 Jul 2024
Viewed by 941
Abstract
Supply chain bottlenecks in port operations lead to significant delays and inefficiencies. Blockchain technology emerges as a viable solution, offering tamper-resistant ledgers, secure transactions, and automation capabilities. While considerable research on developing blockchain-based solutions currently exist, there is a lack of studies that [...] Read more.
Supply chain bottlenecks in port operations lead to significant delays and inefficiencies. Blockchain technology emerges as a viable solution, offering tamper-resistant ledgers, secure transactions, and automation capabilities. While considerable research on developing blockchain-based solutions currently exist, there is a lack of studies that specifically focus on optimizing port document management to speed up supply chain operations. In this paper, a supply-blockchain functional prototype for optimizing port operations using Hyperledger Fabric is introduced. In terms of core functionality, the prototype allows initiation of smart contract corresponding to functions such as creating and editing port-related documents, minimizing manual interventions and enhancing efficiency to reduce port congestion. Furthermore, it provides live tracking of completed events and transactions, facilitating transparency and streamlined oversight. The permissioned nature of Hyperledger Fabric ensures security and robust access controls, aligning well with sensitive port operations. Hyperledger Firefly and its connector framework was used as the middleware to facilitate blockchain integration and various functions of the prototype, while chaincode developed using Go language was used to package and deploy smart contracts. The supply-blockchain framework was used as the theoretical framework for prototype development, and agile project management was adopted to ensure timely completion. The results based on functional and performance testing demonstrate the prototype’s potential in alleviating port documentation bottlenecks and quickly delivering benefits to key stakeholders. Full article
Show Figures

Figure 1

Figure 1
<p>Supply-blockchain framework.</p>
Full article ">Figure 2
<p>MoSCoW prioritization of prototype functionality.</p>
Full article ">Figure 3
<p>Architecture detailing prototype functions and users.</p>
Full article ">Figure 4
<p>Hyperledger Firefly architecture.</p>
Full article ">Figure 5
<p>Prototype development and deployment process.</p>
Full article ">Figure 6
<p>Smart contract—invoke function.</p>
Full article ">Figure 7
<p>CreateDocument function accessed through the Swagger UI.</p>
Full article ">Figure 8
<p>Screenshot of the Hyperledger Firefly Explorer UI.</p>
Full article ">Figure 9
<p>Performance metric report.</p>
Full article ">Figure 10
<p>CPU utilization graph.</p>
Full article ">Figure 11
<p>Memory utilization graph.</p>
Full article ">Figure 12
<p>Submitted vs. finished transactions performance graph.</p>
Full article ">Figure A1
<p>Chaincode.</p>
Full article ">
27 pages, 10431 KiB  
Article
Design and Construction of a Portable IoT Station
by Mario A. Trape, Ali Hellany, Syed K. H. Shah, Jamal Rizk, Mahmood Nagrial and Tosin Famakinwa
Sensors 2024, 24(13), 4116; https://doi.org/10.3390/s24134116 - 25 Jun 2024
Viewed by 816
Abstract
This paper discusses the design and implementation of a portable IoT station. Communication and data synchronization issues in several installations are addressed here, making possible a detailed analysis of the entire system during its operation. The system operator requires a synchronized data stream, [...] Read more.
This paper discusses the design and implementation of a portable IoT station. Communication and data synchronization issues in several installations are addressed here, making possible a detailed analysis of the entire system during its operation. The system operator requires a synchronized data stream, combining multiple communication protocols into one single time stamp. The hardware selected for the portable IoT station complies with the International Electrotechnical Commission (IEC) industrial standards. A short discussion regarding interface customization shows how easily the hardware can be modified so that it is integrated with almost any system. A programmable logic controller enables the Node-RED to be utilized. This open-source middleware defines operations for each global variable nominated in the Modbus register. Two applications are presented and discussed in this paper; each application has a distinct methodology utilized to publish and visualize the acquired data. The portable IoT station is highly customizable, consisting of a modular structure and providing the best platform for future research and development of dedicated algorithms. This paper also demonstrates how the portable IoT station can be implemented in systems where time-based data synchronization is essential while introducing a seamless implementation and operation. Full article
Show Figures

Figure 1

Figure 1
<p>Block structure of the portable IoT station.</p>
Full article ">Figure 2
<p>(<b>a</b>) The side view of the external interface of the portable IoT station; (<b>b</b>) the top view of the external interface of the portable IoT station; (<b>c</b>) the front view of the external interface of the portable IoT station.</p>
Full article ">Figure 2 Cont.
<p>(<b>a</b>) The side view of the external interface of the portable IoT station; (<b>b</b>) the top view of the external interface of the portable IoT station; (<b>c</b>) the front view of the external interface of the portable IoT station.</p>
Full article ">Figure 3
<p>Simplified representation of the hardware integration between PS Block with ACOM, PLC, EM, UPS, and external interface block.</p>
Full article ">Figure 4
<p>Authorization process required by each communication protocol.</p>
Full article ">Figure 5
<p>System communication topology.</p>
Full article ">Figure 6
<p>Internal data process flow used in the PLC.</p>
Full article ">Figure 7
<p>Node-RED dataflow.</p>
Full article ">Figure 8
<p>System topology applied during Application A.</p>
Full article ">Figure 9
<p>System configuration utilized during Application A.</p>
Full article ">Figure 10
<p>Process flow configured during Application A.</p>
Full article ">Figure 11
<p>(<b>a</b>) The Wattsense console accessed through a computer; (<b>b</b>) the Wattsense console accessed through a smartphone.</p>
Full article ">Figure 12
<p>System topology applied during Application B.</p>
Full article ">Figure 13
<p>System configuration utilized during Application B.</p>
Full article ">Figure 14
<p>Process flow configured during Application B.</p>
Full article ">Figure 15
<p>The direct interface from the Schneider gateway, which also illustrates the direct connection to the load, grid, and battery bank.</p>
Full article ">Figure 16
<p>Visualization tool from the UR20, which summarizes the data input from the Schneider gateway and EM220.</p>
Full article ">Figure 17
<p>Process flow required to evaluate the latency of the system based on the application required.</p>
Full article ">Figure 18
<p>Data latency evaluation between Application A and Application B.</p>
Full article ">
13 pages, 828 KiB  
Article
Secure IoT Communication: Implementing a One-Time Pad Protocol with True Random Numbers and Secure Multiparty Sums
by Julio Fenner, Patricio Galeas, Francisco Escobar and Rail Neira
Appl. Sci. 2024, 14(12), 5354; https://doi.org/10.3390/app14125354 - 20 Jun 2024
Cited by 1 | Viewed by 723
Abstract
We introduce an innovative approach for secure communication in the Internet of Things (IoT) environment using a one-time pad (OTP) protocol. This protocol is augmented by incorporating a secure multiparty sum protocol to produce OTP keys from genuine random numbers obtained from the [...] Read more.
We introduce an innovative approach for secure communication in the Internet of Things (IoT) environment using a one-time pad (OTP) protocol. This protocol is augmented by incorporating a secure multiparty sum protocol to produce OTP keys from genuine random numbers obtained from the physical phenomena observed in each device. We have implemented our method using ZeroC-Ice v.3.7, dependable middleware for distributed computing, demonstrating its practicality in various hybrid IoT scenarios, particularly in devices with limited processing capabilities. The security features of our protocol are evaluated under the Dolev–Yao threat model, providing a thorough assessment of its defense against potential cyber threats. Full article
(This article belongs to the Special Issue Advances in Internet of Things (IoT) Technologies and Cybersecurity)
Show Figures

Figure 1

Figure 1
<p>Diagram depicting key agreement between <math display="inline"><semantics> <msub> <mi>P</mi> <mn>1</mn> </msub> </semantics></math> and <math display="inline"><semantics> <msub> <mi>P</mi> <mn>2</mn> </msub> </semantics></math> from the private inputs <math display="inline"><semantics> <msub> <mi>x</mi> <mn>1</mn> </msub> </semantics></math> (in red) and <math display="inline"><semantics> <msub> <mi>x</mi> <mn>2</mn> </msub> </semantics></math> (in green) by using <math display="inline"><semantics> <msub> <mi>P</mi> <mn>3</mn> </msub> </semantics></math> (in blue) as an auxiliary unit in the SMPC protocol. The total sum is <math display="inline"><semantics> <mrow> <mi>K</mi> <mo>=</mo> <msub> <mi>s</mi> <mn>1</mn> </msub> <mo>+</mo> <msub> <mi>s</mi> <mn>2</mn> </msub> <mo>+</mo> <msub> <mi>s</mi> <mn>3</mn> </msub> <mo>=</mo> <msub> <mi>x</mi> <mn>1</mn> </msub> <mo>+</mo> <msub> <mi>x</mi> <mn>2</mn> </msub> <mo>+</mo> <msub> <mi>x</mi> <mn>3</mn> </msub> </mrow> </semantics></math>, where <math display="inline"><semantics> <msub> <mi>x</mi> <mn>3</mn> </msub> </semantics></math> is random and cannot be traced by observation of the communication.</p>
Full article ">Figure 2
<p>Diagram depictingOn-the-Fly Key Agreement and encryption between <math display="inline"><semantics> <msub> <mi>P</mi> <mn>1</mn> </msub> </semantics></math> and <math display="inline"><semantics> <msub> <mi>P</mi> <mn>2</mn> </msub> </semantics></math> using <math display="inline"><semantics> <msub> <mi>P</mi> <mn>3</mn> </msub> </semantics></math> (in blue) as an auxiliary unit in the SMPC protocol. Data owned by the client, server, and Dummy party are represented in red, green, and blue, respectively.</p>
Full article ">Figure 3
<p>Simple SMP-OTF4IOT’s “Hello secret world!”: client sending encrypted message and server receiving and decrypting the message.</p>
Full article ">
Back to TopTop