首页 > 最新文献

2019 II Workshop on Metrology for Industry 4.0 and IoT (MetroInd4.0&IoT)最新文献

英文 中文
A Holistic Overview of the Internet of Things Ecosystem 物联网生态系统整体概述
Pub Date : 2022-10-26 DOI: 10.3390/iot3040022
Gaetanino Paolone, Danilo Iachetti, Romolo Paesani, Francesco Pilotti, Martina Marinelli, P. D. Felice
The Internet of Things (IoT) is a complex ecosystem of connected devices that exchange data over a wired or wireless network and whose final aim is to provide services either to humans or machines. The IoT has seen rapid development over the past decade. The total number of installed connected devices is expected to grow exponentially in the near future, since more and more domains are looking for IoT solutions. As a consequence, an increasing number of developers are approaching IoT technology for the first time. Unfortunately, the number of IoT-related studies published every year is becoming huge, with the obvious consequence that it would be impossible for anyone to predict the time that could be necessary to find a paper talking about a given problem at hand. This is the reason why IoT-related discussions have become predominant in various practitioners’ forums, which moderate thousands of posts each month. The present paper’s contribution is twofold. First, it aims at providing a holistic overview of the heterogeneous IoT world by taking into account a technology perspective and a business perspective. For each topic taken into account, a tutorial introduction (deliberately devoid of technical content to make this document within the reach of non-technical readers as well) is provided. Then, a table of very recent review papers is given for each topic, as the result of a systematic mapping study.
物联网(IoT)是一个由连接设备组成的复杂生态系统,通过有线或无线网络交换数据,其最终目标是为人类或机器提供服务。物联网在过去十年中发展迅速。由于越来越多的领域正在寻找物联网解决方案,预计已安装的连接设备总数将在不久的将来呈指数级增长。因此,越来越多的开发人员第一次接触物联网技术。不幸的是,每年发表的与物联网相关的研究数量越来越多,其明显的后果是,任何人都不可能预测到找到一篇讨论手头给定问题的论文所需的时间。这就是为什么与物联网相关的讨论在各种从业者论坛上占据主导地位的原因,这些论坛每个月都会发表数千篇帖子。本文的贡献是双重的。首先,它旨在通过考虑技术角度和业务角度,提供异构物联网世界的整体概述。对于考虑到的每个主题,都提供了教程介绍(故意不包含技术内容,以使本文档也适合非技术读者)。然后,作为系统绘图研究的结果,给出了每个主题的最新评论论文表。
{"title":"A Holistic Overview of the Internet of Things Ecosystem","authors":"Gaetanino Paolone, Danilo Iachetti, Romolo Paesani, Francesco Pilotti, Martina Marinelli, P. D. Felice","doi":"10.3390/iot3040022","DOIUrl":"https://doi.org/10.3390/iot3040022","url":null,"abstract":"The Internet of Things (IoT) is a complex ecosystem of connected devices that exchange data over a wired or wireless network and whose final aim is to provide services either to humans or machines. The IoT has seen rapid development over the past decade. The total number of installed connected devices is expected to grow exponentially in the near future, since more and more domains are looking for IoT solutions. As a consequence, an increasing number of developers are approaching IoT technology for the first time. Unfortunately, the number of IoT-related studies published every year is becoming huge, with the obvious consequence that it would be impossible for anyone to predict the time that could be necessary to find a paper talking about a given problem at hand. This is the reason why IoT-related discussions have become predominant in various practitioners’ forums, which moderate thousands of posts each month. The present paper’s contribution is twofold. First, it aims at providing a holistic overview of the heterogeneous IoT world by taking into account a technology perspective and a business perspective. For each topic taken into account, a tutorial introduction (deliberately devoid of technical content to make this document within the reach of non-technical readers as well) is provided. Then, a table of very recent review papers is given for each topic, as the result of a systematic mapping study.","PeriodicalId":6745,"journal":{"name":"2019 II Workshop on Metrology for Industry 4.0 and IoT (MetroInd4.0&IoT)","volume":"36 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86860943","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Performance Evaluation of Federated Learning for Residential Energy Forecasting 联邦学习在住宅能源预测中的性能评价
Pub Date : 2022-09-19 DOI: 10.3390/iot3030021
Eugenia Petrangeli, N. Tonellotto, C. Vallati
Short-term energy-consumption forecasting plays an important role in the planning of energy production, transportation and distribution. With the widespread adoption of decentralised self-generating energy systems in residential communities, short-term load forecasting is expected to be performed in a distributed manner to preserve privacy and ensure timely feedback to perform reconfiguration of the distribution network. In this context, edge computing is expected to be an enabling technology to ensure decentralized data collection, management, processing and delivery. At the same time, federated learning is an emerging paradigm that fits naturally in such an edge-computing environment, providing an AI-powered and privacy-preserving solution for time-series forecasting. In this paper, we present a performance evaluation of different federated-learning configurations resulting in different privacy levels to the forecast residential energy consumption with data collected by real smart meters. To this aim, different experiments are run using Flower (a popular federated learning framework) and real energy consumption data. Our results allow us to demonstrate the feasibility of such an approach and to study the trade-off between data privacy and the accuracy of the prediction, which characterizes the quality of service of the system for the final users.
短期能源消费预测在能源生产、运输和分配规划中起着重要的作用。随着分散式自发电系统在住宅社区的广泛应用,短期负荷预测有望以分布式方式进行,以保护隐私并确保及时反馈以进行配电网的重新配置。在这种情况下,边缘计算有望成为一种使能技术,以确保分散的数据收集、管理、处理和交付。与此同时,联邦学习是一种新兴的范例,自然适合于这样的边缘计算环境,为时间序列预测提供了人工智能驱动和隐私保护的解决方案。在本文中,我们提出了一个性能评估不同的联邦学习配置导致不同隐私级别的预测住宅能源消耗与实际智能电表收集的数据。为此,使用Flower(一种流行的联邦学习框架)和真实的能源消耗数据进行了不同的实验。我们的结果使我们能够证明这种方法的可行性,并研究数据隐私和预测准确性之间的权衡,这是系统为最终用户提供服务质量的特征。
{"title":"Performance Evaluation of Federated Learning for Residential Energy Forecasting","authors":"Eugenia Petrangeli, N. Tonellotto, C. Vallati","doi":"10.3390/iot3030021","DOIUrl":"https://doi.org/10.3390/iot3030021","url":null,"abstract":"Short-term energy-consumption forecasting plays an important role in the planning of energy production, transportation and distribution. With the widespread adoption of decentralised self-generating energy systems in residential communities, short-term load forecasting is expected to be performed in a distributed manner to preserve privacy and ensure timely feedback to perform reconfiguration of the distribution network. In this context, edge computing is expected to be an enabling technology to ensure decentralized data collection, management, processing and delivery. At the same time, federated learning is an emerging paradigm that fits naturally in such an edge-computing environment, providing an AI-powered and privacy-preserving solution for time-series forecasting. In this paper, we present a performance evaluation of different federated-learning configurations resulting in different privacy levels to the forecast residential energy consumption with data collected by real smart meters. To this aim, different experiments are run using Flower (a popular federated learning framework) and real energy consumption data. Our results allow us to demonstrate the feasibility of such an approach and to study the trade-off between data privacy and the accuracy of the prediction, which characterizes the quality of service of the system for the final users.","PeriodicalId":6745,"journal":{"name":"2019 II Workshop on Metrology for Industry 4.0 and IoT (MetroInd4.0&IoT)","volume":"24 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72668458","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
An Application of IoT in a Drone Inspection Service for Environmental Control 物联网在无人机环境控制巡检服务中的应用
Pub Date : 2022-08-30 DOI: 10.3390/iot3030020
Muriel Cabianca, M. L. Clemente, G. Gatto, Carlo Impagliazzo, Lidia Leoni, Martino Masia, Riccardo Piras
This paper presents an exploratory activity with a drone inspection service for environmental control. The aim of the service is to provide technical support to decision-makers in environmental risk management. The proposed service uses IoT for the interaction between a mobile application, a Smart City platform, and an Unmanned Aircraft System (UAS). The mobile application allows the users to report risky situations, such as fire ignition, spills of pollutants in water, or illegal dumping; the user has only to specify the class of the event, while the geographical coordinates are automatically taken from device-integrated GPS. The message sent from the mobile application arrives to a Smart City platform, which shows all the received alerts on a 3D satellite map, to support decision-makers in choosing where a drone inspection is required. From the Smart City platform, the message is sent to the drone service operator; a CSV file defining the itinerary of the drone is automatically built and shown through the platform; the drone starts the mission providing a video, which is used by the decision-makers to understand whether the situation calls for immediate action. An experimental activity in an open field was carried out to validate the whole chain, from the alert to the drone mission, enriched by a Smart City platform to enable a decision-maker to better manage the situation.
本文提出了一种利用无人机检测服务进行环境控制的探索性活动。这项服务的目的是为决策者提供环境风险管理方面的技术支援。拟议的服务将物联网用于移动应用程序、智慧城市平台和无人机系统(UAS)之间的交互。该移动应用程序允许用户报告危险情况,如着火、水中污染物泄漏或非法倾倒;用户只需指定事件的类别,而地理坐标则自动从设备集成的GPS中获取。从移动应用程序发送的信息到达智能城市平台,该平台在3D卫星地图上显示所有收到的警报,以支持决策者选择需要无人机检查的地方。信息从智慧城市平台发送给无人机服务操作员;定义无人机行程的CSV文件自动生成并通过平台显示;无人机开始执行任务时提供一段视频,决策者可以利用这段视频来了解情况是否需要立即采取行动。在开放场地进行了一项实验活动,以验证从警报到无人机任务的整个链条,并通过智慧城市平台进行丰富,使决策者能够更好地管理情况。
{"title":"An Application of IoT in a Drone Inspection Service for Environmental Control","authors":"Muriel Cabianca, M. L. Clemente, G. Gatto, Carlo Impagliazzo, Lidia Leoni, Martino Masia, Riccardo Piras","doi":"10.3390/iot3030020","DOIUrl":"https://doi.org/10.3390/iot3030020","url":null,"abstract":"This paper presents an exploratory activity with a drone inspection service for environmental control. The aim of the service is to provide technical support to decision-makers in environmental risk management. The proposed service uses IoT for the interaction between a mobile application, a Smart City platform, and an Unmanned Aircraft System (UAS). The mobile application allows the users to report risky situations, such as fire ignition, spills of pollutants in water, or illegal dumping; the user has only to specify the class of the event, while the geographical coordinates are automatically taken from device-integrated GPS. The message sent from the mobile application arrives to a Smart City platform, which shows all the received alerts on a 3D satellite map, to support decision-makers in choosing where a drone inspection is required. From the Smart City platform, the message is sent to the drone service operator; a CSV file defining the itinerary of the drone is automatically built and shown through the platform; the drone starts the mission providing a video, which is used by the decision-makers to understand whether the situation calls for immediate action. An experimental activity in an open field was carried out to validate the whole chain, from the alert to the drone mission, enriched by a Smart City platform to enable a decision-maker to better manage the situation.","PeriodicalId":6745,"journal":{"name":"2019 II Workshop on Metrology for Industry 4.0 and IoT (MetroInd4.0&IoT)","volume":"15 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91341612","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Survey of Security Architectures for Edge Computing-Based IoT 基于边缘计算的物联网安全架构研究
Pub Date : 2022-06-30 DOI: 10.3390/iot3030019
Elahe Fazeldehkordi, Tor-Morten Grønli
The Internet of Things (IoT) is an innovative scheme providing massive applications that have become part of our daily lives. The number of IoT and connected devices are growing rapidly. However, transferring the corresponding huge, generated data from these IoT devices to the cloud produces challenges in terms of latency, bandwidth and network resources, data transmission costs, long transmission times leading to higher power consumption of IoT devices, service availability, as well as security and privacy issues. Edge computing (EC) is a promising strategy to overcome these challenges by bringing data processing and storage close to end users and IoT devices. In this paper, we first provide a comprehensive definition of edge computing and similar computing paradigms, including their similarities and differences. Then, we extensively discuss the major security and privacy attacks and threats in the context of EC-based IoT and provide possible countermeasures and solutions. Next, we propose a secure EC-based architecture for IoT applications. Furthermore, an application scenario of edge computing in IoT is introduced, and the advantages/disadvantages of the scenario based on edge computing and cloud computing are discussed. Finally, we discuss the most prominent security and privacy issues that can occur in EC-based IoT scenarios.
物联网(IoT)是一项提供大量应用的创新方案,已成为我们日常生活的一部分。物联网和连接设备的数量正在迅速增长。然而,将这些物联网设备产生的海量数据传输到云端,在延迟、带宽和网络资源、数据传输成本、传输时间过长导致物联网设备功耗更高、服务可用性以及安全和隐私问题等方面带来了挑战。边缘计算(EC)是一种很有前途的策略,可以通过将数据处理和存储靠近最终用户和物联网设备来克服这些挑战。在本文中,我们首先对边缘计算和类似计算范式进行了全面的定义,包括它们的异同。然后,我们广泛讨论了基于ec的物联网背景下的主要安全和隐私攻击和威胁,并提供了可能的对策和解决方案。接下来,我们为物联网应用提出了一个安全的基于ec的架构。介绍了一种边缘计算在物联网中的应用场景,并讨论了基于边缘计算和云计算的应用场景的优缺点。最后,我们讨论了在基于ec的物联网场景中可能发生的最突出的安全和隐私问题。
{"title":"A Survey of Security Architectures for Edge Computing-Based IoT","authors":"Elahe Fazeldehkordi, Tor-Morten Grønli","doi":"10.3390/iot3030019","DOIUrl":"https://doi.org/10.3390/iot3030019","url":null,"abstract":"The Internet of Things (IoT) is an innovative scheme providing massive applications that have become part of our daily lives. The number of IoT and connected devices are growing rapidly. However, transferring the corresponding huge, generated data from these IoT devices to the cloud produces challenges in terms of latency, bandwidth and network resources, data transmission costs, long transmission times leading to higher power consumption of IoT devices, service availability, as well as security and privacy issues. Edge computing (EC) is a promising strategy to overcome these challenges by bringing data processing and storage close to end users and IoT devices. In this paper, we first provide a comprehensive definition of edge computing and similar computing paradigms, including their similarities and differences. Then, we extensively discuss the major security and privacy attacks and threats in the context of EC-based IoT and provide possible countermeasures and solutions. Next, we propose a secure EC-based architecture for IoT applications. Furthermore, an application scenario of edge computing in IoT is introduced, and the advantages/disadvantages of the scenario based on edge computing and cloud computing are discussed. Finally, we discuss the most prominent security and privacy issues that can occur in EC-based IoT scenarios.","PeriodicalId":6745,"journal":{"name":"2019 II Workshop on Metrology for Industry 4.0 and IoT (MetroInd4.0&IoT)","volume":"34 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80824930","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Evaluation and Selection Models for Ensemble Intrusion Detection Systems in IoT 物联网集成入侵检测系统的评估与选择模型
Pub Date : 2022-04-28 DOI: 10.3390/iot3020017
Rubayyi Alghamdi, M. Bellaiche
Using the Internet of Things (IoT) for various applications, such as home and wearables devices, network applications, and even self-driven vehicles, detecting abnormal traffic is one of the problematic areas for researchers to protect network infrastructure from adversary activities. Several network systems suffer from drawbacks that allow intruders to use malicious traffic to obtain unauthorized access. Attacks such as Distributed Denial of Service attacks (DDoS), Denial of Service attacks (DoS), and Service Scans demand a unique automatic system capable of identifying traffic abnormality at the earliest stage to avoid system damage. Numerous automatic approaches can detect abnormal traffic. However, accuracy is not only the issue with current Intrusion Detection Systems (IDS), but the efficiency, flexibility, and scalability need to be enhanced to detect attack traffic from various IoT networks. Thus, this study concentrates on constructing an ensemble classifier using the proposed Integrated Evaluation Metrics (IEM) to determine the best performance of IDS models. The automated Ranking and Best Selection Method (RBSM) is performed using the proposed IEM to select the best model for the ensemble classifier to detect highly accurate attacks using machine learning and deep learning techniques. Three datasets of real IoT traffic were merged to extend the proposed approach’s ability to detect attack traffic from heterogeneous IoT networks. The results show that the performance of the proposed model achieved the highest accuracy of 99.45% and 97.81% for binary and multi-classification, respectively.
将物联网(IoT)用于各种应用,如家庭和可穿戴设备、网络应用,甚至自动驾驶车辆,检测异常流量是研究人员保护网络基础设施免受攻击活动影响的问题领域之一。一些网络系统存在缺陷,允许入侵者使用恶意流量获得未经授权的访问。DDoS (Distributed Denial of Service attack)、DoS (Denial of Service attack)和服务扫描(Service scan)等攻击需要一个独特的自动系统,能够在第一时间发现流量异常,避免对系统造成损害。许多自动方法可以检测异常流量。然而,准确性不仅是当前入侵检测系统(IDS)的问题,而且需要提高效率、灵活性和可扩展性,以检测来自各种物联网网络的攻击流量。因此,本研究的重点是使用所提出的集成评估度量(Integrated Evaluation Metrics, IEM)构建一个集成分类器,以确定IDS模型的最佳性能。使用所提出的IEM执行自动排名和最佳选择方法(RBSM),为集成分类器选择最佳模型,使用机器学习和深度学习技术检测高精度攻击。将三个真实物联网流量数据集合并,以扩展所提出的方法检测来自异构物联网网络的攻击流量的能力。结果表明,该模型在二元分类和多重分类上的准确率分别达到了99.45%和97.81%。
{"title":"Evaluation and Selection Models for Ensemble Intrusion Detection Systems in IoT","authors":"Rubayyi Alghamdi, M. Bellaiche","doi":"10.3390/iot3020017","DOIUrl":"https://doi.org/10.3390/iot3020017","url":null,"abstract":"Using the Internet of Things (IoT) for various applications, such as home and wearables devices, network applications, and even self-driven vehicles, detecting abnormal traffic is one of the problematic areas for researchers to protect network infrastructure from adversary activities. Several network systems suffer from drawbacks that allow intruders to use malicious traffic to obtain unauthorized access. Attacks such as Distributed Denial of Service attacks (DDoS), Denial of Service attacks (DoS), and Service Scans demand a unique automatic system capable of identifying traffic abnormality at the earliest stage to avoid system damage. Numerous automatic approaches can detect abnormal traffic. However, accuracy is not only the issue with current Intrusion Detection Systems (IDS), but the efficiency, flexibility, and scalability need to be enhanced to detect attack traffic from various IoT networks. Thus, this study concentrates on constructing an ensemble classifier using the proposed Integrated Evaluation Metrics (IEM) to determine the best performance of IDS models. The automated Ranking and Best Selection Method (RBSM) is performed using the proposed IEM to select the best model for the ensemble classifier to detect highly accurate attacks using machine learning and deep learning techniques. Three datasets of real IoT traffic were merged to extend the proposed approach’s ability to detect attack traffic from heterogeneous IoT networks. The results show that the performance of the proposed model achieved the highest accuracy of 99.45% and 97.81% for binary and multi-classification, respectively.","PeriodicalId":6745,"journal":{"name":"2019 II Workshop on Metrology for Industry 4.0 and IoT (MetroInd4.0&IoT)","volume":"21 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-04-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78750934","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
On the Performance of Federated Learning Algorithms for IoT 物联网联邦学习算法的性能研究
Pub Date : 2022-04-22 DOI: 10.3390/iot3020016
Mehreen Tahir, M. Ali
Federated Learning (FL) is a state-of-the-art technique used to build machine learning (ML) models based on distributed data sets. It enables In-Edge AI, preserves data locality, protects user data, and allows ownership. These characteristics of FL make it a suitable choice for IoT networks due to its intrinsic distributed infrastructure. However, FL presents a few unique challenges; the most noteworthy is training over largely heterogeneous data samples on IoT devices. The heterogeneity of devices and models in the complex IoT networks greatly influences the FL training process and makes traditional FL unsuitable to be directly deployed, while many recent research works claim to mitigate the negative impact of heterogeneity in FL networks, unfortunately, the effectiveness of these proposed solutions has never been studied and quantified. In this study, we thoroughly analyze the impact of heterogeneity in FL and present an overview of the practical problems exerted by the system and statistical heterogeneity. We have extensively investigated state-of-the-art algorithms focusing on their practical use over IoT networks. We have also conducted a comparative analysis of the top available federated algorithms over a heterogeneous dynamic IoT network. Our analysis shows that the existing solutions fail to effectively mitigate the problem, thus highlighting the significance of incorporating both system and statistical heterogeneity in FL system design.
联邦学习(FL)是一种最先进的技术,用于基于分布式数据集构建机器学习(ML)模型。它支持In-Edge AI,保留数据局部性,保护用户数据,并允许所有权。由于其固有的分布式基础设施,FL的这些特性使其成为物联网网络的合适选择。然而,FL提出了一些独特的挑战;最值得注意的是在物联网设备上对大量异构数据样本进行训练。复杂物联网网络中设备和模型的异质性极大地影响了FL训练过程,使传统的FL不适合直接部署,而最近许多研究工作声称可以减轻FL网络中异质性的负面影响,不幸的是,这些提出的解决方案的有效性从未被研究和量化。在本研究中,我们深入分析了异质性对FL的影响,并概述了系统和统计异质性所带来的实际问题。我们广泛研究了最先进的算法,重点关注它们在物联网网络中的实际应用。我们还对异构动态物联网网络上可用的顶级联邦算法进行了比较分析。我们的分析表明,现有的解决方案未能有效缓解这一问题,从而突出了在FL系统设计中同时考虑系统和统计异质性的重要性。
{"title":"On the Performance of Federated Learning Algorithms for IoT","authors":"Mehreen Tahir, M. Ali","doi":"10.3390/iot3020016","DOIUrl":"https://doi.org/10.3390/iot3020016","url":null,"abstract":"Federated Learning (FL) is a state-of-the-art technique used to build machine learning (ML) models based on distributed data sets. It enables In-Edge AI, preserves data locality, protects user data, and allows ownership. These characteristics of FL make it a suitable choice for IoT networks due to its intrinsic distributed infrastructure. However, FL presents a few unique challenges; the most noteworthy is training over largely heterogeneous data samples on IoT devices. The heterogeneity of devices and models in the complex IoT networks greatly influences the FL training process and makes traditional FL unsuitable to be directly deployed, while many recent research works claim to mitigate the negative impact of heterogeneity in FL networks, unfortunately, the effectiveness of these proposed solutions has never been studied and quantified. In this study, we thoroughly analyze the impact of heterogeneity in FL and present an overview of the practical problems exerted by the system and statistical heterogeneity. We have extensively investigated state-of-the-art algorithms focusing on their practical use over IoT networks. We have also conducted a comparative analysis of the top available federated algorithms over a heterogeneous dynamic IoT network. Our analysis shows that the existing solutions fail to effectively mitigate the problem, thus highlighting the significance of incorporating both system and statistical heterogeneity in FL system design.","PeriodicalId":6745,"journal":{"name":"2019 II Workshop on Metrology for Industry 4.0 and IoT (MetroInd4.0&IoT)","volume":"4 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82276109","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Editorial “Industrial IoT as IT and OT Convergence: Challenges and Opportunities” 社论《工业物联网作为IT与OT的融合:挑战与机遇》
Pub Date : 2022-03-15 DOI: 10.3390/iot3010014
Carlo Giannelli, Marco Picone
During the last decade, the advent of the Internet of Things (IoT) and its quick and pervasive evolution have significantly revolutionized the Information Technology ecosystem [...]
在过去的十年中,物联网(IoT)的出现及其快速而普遍的发展已经显著地改变了信息技术生态系统[…]
{"title":"Editorial “Industrial IoT as IT and OT Convergence: Challenges and Opportunities”","authors":"Carlo Giannelli, Marco Picone","doi":"10.3390/iot3010014","DOIUrl":"https://doi.org/10.3390/iot3010014","url":null,"abstract":"During the last decade, the advent of the Internet of Things (IoT) and its quick and pervasive evolution have significantly revolutionized the Information Technology ecosystem [...]","PeriodicalId":6745,"journal":{"name":"2019 II Workshop on Metrology for Industry 4.0 and IoT (MetroInd4.0&IoT)","volume":"2 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-03-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82348774","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Scheduling UWB Ranging and Backbone Communications in a Pure Wireless Indoor Positioning System 纯无线室内定位系统中UWB测距和主干网通信调度
Pub Date : 2022-03-02 DOI: 10.3390/iot3010013
Maximilien Charlier, R. Koutsiamanis, B. Quoitin
In this paper, we present and evaluate an ultra-wideband (UWB) indoor processing architecture that allows the performing of simultaneous localizations of mobile tags. This architecture relies on a network of low-power fixed anchors that provide forward-ranging measurements to a localization engine responsible for performing trilateration. The communications within this network are orchestrated by UWB-TSCH, an adaptation to the ultra-wideband (UWB) wireless technology of the time-slotted channel-hopping (TSCH) mode of IEEE 802.15.4. As a result of global synchronization, the architecture allows deterministic channel access and low power consumption. Moreover, it makes it possible to communicate concurrently over multiple frequency channels or using orthogonal preamble codes. To schedule communications in such a network, we designed a dedicated centralized scheduler inspired from the traffic aware scheduling algorithm (TASA). By organizing the anchors in multiple cells, the scheduler is able to perform simultaneous localizations and transmissions as long as the corresponding anchors are sufficiently far away to not interfere with each other. In our indoor positioning system (IPS), this is combined with dynamic registration of mobile tags to anchors, easing mobility, as no rescheduling is required. This approach makes our ultra-wideband (UWB) indoor positioning system (IPS) more scalable and reduces deployment costs since it does not require separate networks to perform ranging measurements and to forward them to the localization engine. We further improved our scheduling algorithm with support for multiple sinks and in-network data aggregation. We show, through simulations over large networks containing hundreds of cells, that high positioning rates can be achieved. Notably, we were able to fully schedule a 400-cell/400-tag network in less than 11 s in the worst case, and to create compact schedules which were up to 11 times shorter than otherwise with the use of aggregation, while also bounding queue sizes on anchors to support realistic use situations.
在本文中,我们提出并评估了一种超宽带(UWB)室内处理架构,该架构允许执行移动标签的同时定位。该架构依赖于低功耗固定锚的网络,为负责执行三边测量的定位引擎提供前向测量。该网络内的通信由UWB-TSCH编排,UWB-TSCH是对IEEE 802.15.4的时隙信道跳频(TSCH)模式的超宽带(UWB)无线技术的适应。由于全局同步,该架构允许确定的通道访问和低功耗。此外,它使通过多个频率信道或使用正交前导码并发通信成为可能。为了在这样的网络中调度通信,我们设计了一个专用的集中式调度程序,灵感来自流量感知调度算法(TASA)。通过在多个单元中组织锚点,调度程序能够同时执行定位和传输,只要相应的锚点距离足够远,不会相互干扰。在我们的室内定位系统(IPS)中,这与移动标签到锚的动态注册相结合,简化了移动性,因为不需要重新安排。这种方法使我们的超宽带(UWB)室内定位系统(IPS)更具可扩展性,并降低了部署成本,因为它不需要单独的网络来执行测距测量并将其转发给定位引擎。我们进一步改进了调度算法,支持多汇聚和网络内数据聚合。我们通过对包含数百个单元的大型网络的模拟表明,可以实现高定位率。值得注意的是,在最坏的情况下,我们能够在不到11秒的时间内完全调度一个400个单元/400个标签的网络,并且创建紧凑的调度,比使用聚合缩短了11倍,同时还在锚上限定队列大小以支持实际使用情况。
{"title":"Scheduling UWB Ranging and Backbone Communications in a Pure Wireless Indoor Positioning System","authors":"Maximilien Charlier, R. Koutsiamanis, B. Quoitin","doi":"10.3390/iot3010013","DOIUrl":"https://doi.org/10.3390/iot3010013","url":null,"abstract":"In this paper, we present and evaluate an ultra-wideband (UWB) indoor processing architecture that allows the performing of simultaneous localizations of mobile tags. This architecture relies on a network of low-power fixed anchors that provide forward-ranging measurements to a localization engine responsible for performing trilateration. The communications within this network are orchestrated by UWB-TSCH, an adaptation to the ultra-wideband (UWB) wireless technology of the time-slotted channel-hopping (TSCH) mode of IEEE 802.15.4. As a result of global synchronization, the architecture allows deterministic channel access and low power consumption. Moreover, it makes it possible to communicate concurrently over multiple frequency channels or using orthogonal preamble codes. To schedule communications in such a network, we designed a dedicated centralized scheduler inspired from the traffic aware scheduling algorithm (TASA). By organizing the anchors in multiple cells, the scheduler is able to perform simultaneous localizations and transmissions as long as the corresponding anchors are sufficiently far away to not interfere with each other. In our indoor positioning system (IPS), this is combined with dynamic registration of mobile tags to anchors, easing mobility, as no rescheduling is required. This approach makes our ultra-wideband (UWB) indoor positioning system (IPS) more scalable and reduces deployment costs since it does not require separate networks to perform ranging measurements and to forward them to the localization engine. We further improved our scheduling algorithm with support for multiple sinks and in-network data aggregation. We show, through simulations over large networks containing hundreds of cells, that high positioning rates can be achieved. Notably, we were able to fully schedule a 400-cell/400-tag network in less than 11 s in the worst case, and to create compact schedules which were up to 11 times shorter than otherwise with the use of aggregation, while also bounding queue sizes on anchors to support realistic use situations.","PeriodicalId":6745,"journal":{"name":"2019 II Workshop on Metrology for Industry 4.0 and IoT (MetroInd4.0&IoT)","volume":"46 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-03-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88264007","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Conflict Detection and Resolution in IoT Systems: A Survey 物联网系统中的冲突检测和解决:综述
Pub Date : 2022-02-28 DOI: 10.3390/iot3010012
P. Pradeep, K. Kant
Internet of Things (IoT) systems are becoming ubiquitous in various cyber–physical infrastructures, including buildings, vehicular traffic, goods transport and delivery, manufacturing, health care, urban farming, etc. Often multiple such IoT subsystems are deployed in the same physical area and designed, deployed, maintained, and perhaps even operated by different vendors or organizations (or “parties”). The collective operational behavior of multiple IoT subsystems can be characterized via (1) a set of operational rules and required safety properties and (2) a collection of IoT-based services or applications that interact with one another and share concurrent access to the devices. In both cases, this collective behavior often leads to situations where their operation may conflict, and the conflict resolution becomes complex due to lack of visibility into or understanding of the cross-subsystem interactions and inability to do cross-subsystem actuations. This article addresses the fundamental problem of detecting and resolving safety property violations. We detail the inherent complexities of the problem, survey the work already performed, and layout the future challenges. We also highlight the significance of detecting/resolving conflicts proactively, i.e., dynamically but with a look-ahead into the future based on the context.
物联网(IoT)系统在各种网络物理基础设施中变得无处不在,包括建筑物,车辆交通,货物运输和交付,制造业,医疗保健,城市农业等。通常,多个这样的物联网子系统部署在相同的物理区域,并由不同的供应商或组织(或“各方”)设计、部署、维护甚至操作。多个物联网子系统的集体操作行为可以通过(1)一组操作规则和所需的安全属性以及(2)基于物联网的服务或应用程序的集合来表征,这些服务或应用程序彼此交互并共享对设备的并发访问。在这两种情况下,这种集体行为经常导致它们的操作可能发生冲突的情况,并且由于缺乏对跨子系统交互的可见性或理解以及无法执行跨子系统驱动,冲突解决变得复杂。本文讨论了检测和解决违反安全属性的基本问题。我们详细说明了问题的内在复杂性,调查了已经完成的工作,并规划了未来的挑战。我们还强调了主动检测/解决冲突的重要性,即动态地但基于上下文展望未来。
{"title":"Conflict Detection and Resolution in IoT Systems: A Survey","authors":"P. Pradeep, K. Kant","doi":"10.3390/iot3010012","DOIUrl":"https://doi.org/10.3390/iot3010012","url":null,"abstract":"Internet of Things (IoT) systems are becoming ubiquitous in various cyber–physical infrastructures, including buildings, vehicular traffic, goods transport and delivery, manufacturing, health care, urban farming, etc. Often multiple such IoT subsystems are deployed in the same physical area and designed, deployed, maintained, and perhaps even operated by different vendors or organizations (or “parties”). The collective operational behavior of multiple IoT subsystems can be characterized via (1) a set of operational rules and required safety properties and (2) a collection of IoT-based services or applications that interact with one another and share concurrent access to the devices. In both cases, this collective behavior often leads to situations where their operation may conflict, and the conflict resolution becomes complex due to lack of visibility into or understanding of the cross-subsystem interactions and inability to do cross-subsystem actuations. This article addresses the fundamental problem of detecting and resolving safety property violations. We detail the inherent complexities of the problem, survey the work already performed, and layout the future challenges. We also highlight the significance of detecting/resolving conflicts proactively, i.e., dynamically but with a look-ahead into the future based on the context.","PeriodicalId":6745,"journal":{"name":"2019 II Workshop on Metrology for Industry 4.0 and IoT (MetroInd4.0&IoT)","volume":"28 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86453243","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
An Edge-Based LWM2M Proxy for Device Management to Efficiently Support QoS-Aware IoT Services 基于边缘的LWM2M设备管理代理,高效支持qos感知物联网服务
Pub Date : 2022-02-26 DOI: 10.3390/iot3010011
Martina Pappalardo, A. Virdis, E. Mingozzi
The Internet of Things (IoT) brings Internet connectivity to devices and everyday objects. This huge volume of connected devices has to be managed taking into account the severe energy, memory, processing, and communication constraints of IoT devices and networks. In this context, the OMA LightweightM2M (LWM2M) protocol is designed for remote management of constrained devices, and related service enablement, through a management server usually deployed in a distant cloud data center. Following the Edge Computing paradigm, we propose in this work the introduction of a LWM2M Proxy that is deployed at the network edge, in between IoT devices and management servers. On one hand, the LWM2M Proxy improves various LWM2M management procedures whereas, on the other hand, it enables the support of QoS-aware services provided by IoT devices by allowing the implementation of advanced policies to efficiently use network, computing, and storage (i.e., cache) resources at the edge, thus providing benefits in terms of reduced and more predictable end-to-end latency. We evaluate the proposed solution both by simulation and experimentally, showing that it can strongly improve the LWM2M performance and the QoS of the system.
物联网(IoT)为设备和日常物品带来了互联网连接。必须考虑到物联网设备和网络的严重能量、内存、处理和通信限制来管理如此庞大的连接设备。在这种情况下,OMA轻量级m2m (LWM2M)协议设计用于通过通常部署在远程云数据中心的管理服务器远程管理受约束的设备和相关的服务启用。遵循边缘计算范式,我们在本工作中建议引入部署在网络边缘、物联网设备和管理服务器之间的LWM2M代理。一方面,LWM2M代理改进了各种LWM2M管理程序,而另一方面,它通过允许实施高级策略来有效地利用边缘的网络、计算和存储(即缓存)资源,从而支持物联网设备提供的qos感知服务,从而在减少和更可预测的端到端延迟方面提供好处。我们通过仿真和实验对该方案进行了评估,结果表明该方案能够显著提高LWM2M的性能和系统的QoS。
{"title":"An Edge-Based LWM2M Proxy for Device Management to Efficiently Support QoS-Aware IoT Services","authors":"Martina Pappalardo, A. Virdis, E. Mingozzi","doi":"10.3390/iot3010011","DOIUrl":"https://doi.org/10.3390/iot3010011","url":null,"abstract":"The Internet of Things (IoT) brings Internet connectivity to devices and everyday objects. This huge volume of connected devices has to be managed taking into account the severe energy, memory, processing, and communication constraints of IoT devices and networks. In this context, the OMA LightweightM2M (LWM2M) protocol is designed for remote management of constrained devices, and related service enablement, through a management server usually deployed in a distant cloud data center. Following the Edge Computing paradigm, we propose in this work the introduction of a LWM2M Proxy that is deployed at the network edge, in between IoT devices and management servers. On one hand, the LWM2M Proxy improves various LWM2M management procedures whereas, on the other hand, it enables the support of QoS-aware services provided by IoT devices by allowing the implementation of advanced policies to efficiently use network, computing, and storage (i.e., cache) resources at the edge, thus providing benefits in terms of reduced and more predictable end-to-end latency. We evaluate the proposed solution both by simulation and experimentally, showing that it can strongly improve the LWM2M performance and the QoS of the system.","PeriodicalId":6745,"journal":{"name":"2019 II Workshop on Metrology for Industry 4.0 and IoT (MetroInd4.0&IoT)","volume":"193 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77680398","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
期刊
2019 II Workshop on Metrology for Industry 4.0 and IoT (MetroInd4.0&IoT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1