RESUMEN
Monitoring vast and remote areas like forests using Wireless Sensor Networks (WSNs) presents significant challenges, such as limited energy resources and signal attenuation over long distances due to natural obstacles. Traditional solutions often require extensive infrastructure, which is impractical in such environments. To address these limitations, we introduce the "FloatingBlue" architecture. This architecture, known for its superior energy efficiency, combines Bluetooth Low Energy (BLE) technology with Delay Tolerant Networks (DTN) and data mules. It leverages BLE's low power consumption for energy-efficient sensor broadcasts while utilizing DTN-enabled data mules to collect data from dispersed sensors without constant network connectivity. Deployed in a remote agricultural area in the Amazon region, "FloatingBlue" demonstrated significant improvements in energy efficiency and communication range, with a high Packet Delivery Ratio (PDR). The developed BLE beacon sensor achieved state-of-the-art energy consumption levels, using only 2.25 µJ in sleep mode and 11.8 µJ in transmission mode. Our results highlight "FloatingBlue" as a robust, low-power solution for remote monitoring in challenging environments, offering an energy-efficient and scalable alternative to traditional WSN approaches.
RESUMEN
This article presents a systematic literature review of technologies and solutions for cattle tracking and monitoring based on a comprehensive analysis of scientific articles published since 2017. The main objective of this review is to identify the current state of the art and the trends in this field, as well as to provide a guide for selecting the most suitable solution according to the user's needs and preferences. This review covers various aspects of cattle tracking, such as the devices, sensors, power supply, wireless communication protocols, and software used to collect, process, and visualize the data. The review also compares the advantages and disadvantages of different solutions, such as collars, cameras, and drones, in terms of cost, scalability, precision, and invasiveness. The results show that there is a growing interest and innovation in livestock localization and tracking, with a focus on integrating and adapting various technologies for effective and reliable monitoring in real-world environments.
RESUMEN
Protecting sensitive patient data, such as electrocardiogram (ECG) signals, during RF wireless transmission is essential due to the increasing demand for secure telemedicine communications. This paper presents an innovative chaotic-based encryption system designed to enhance the security and integrity of telemedicine data transmission. The proposed system utilizes a multi-scroll chaotic system for ECG signal encryption based on master-slave synchronization. The ECG signal is encrypted by a master system and securely transmitted to a remote location, where it is decrypted by a slave system using an extended state observer. Synchronization between the master and slave is achieved through the Lyapunov criteria, which ensures system stability. The system also supports Orthogonal Frequency Division Multiplexing (OFDM) and adaptive n-quadrature amplitude modulation (n-QAM) schemes to optimize signal discretization. Experimental validations with a custom transceiver scheme confirmed the system's effectiveness in preventing channel overlap during 2.5 GHz transmissions. Additionally, a commercial RF Power Amplifier (RF-PA) for LTE applications and a development board were integrated to monitor transmission quality. The proposed encryption system ensures robust and efficient RF transmission of ECG data, addressing critical challenges in the wireless communication of sensitive medical information. This approach demonstrates the potential for broader applications in modern telemedicine environments, providing a reliable and efficient solution for the secure transmission of healthcare data.
RESUMEN
The development of intelligent transportation systems (ITS), vehicular ad hoc networks (VANETs), and autonomous driving (AD) has progressed rapidly in recent years, driven by artificial intelligence (AI), the internet of things (IoT), and their integration with dedicated short-range communications (DSRC) systems and fifth-generation (5G) networks. This has led to improved mobility conditions in different road propagation environments: urban, suburban, rural, and highway. The use of these communication technologies has enabled drivers and pedestrians to be more aware of the need to improve their behavior and decision making in adverse traffic conditions by sharing information from cameras, radars, and sensors widely deployed in vehicles and road infrastructure. However, wireless data transmission in VANETs is affected by the specific conditions of the propagation environment, weather, terrain, traffic density, and frequency bands used. In this paper, we characterize the path loss based on the extensive measurement campaign carrier out in vehicular environments at 700 MHz and 5.9 GHz under realistic road traffic conditions. From a linear dual-slope path loss propagation model, the results of the path loss exponents and the standard deviations of the shadowing are reported. This study focused on three different environments, i.e., urban with high traffic density (U-HD), urban with moderate/low traffic density (U-LD), and suburban (SU). The results presented here can be easily incorporated into VANET simulators to develop, evaluate, and validate new protocols and system architecture configurations under more realistic propagation conditions.
RESUMEN
This article addresses the impact of transient pressure anomalies in hydraulic systems, triggered by the opening or closing of valves or pumps, instantly disturbing the line of hydraulic gradient (LGH). This variation in pressure has significant consequences both in hydraulic and structural terms for water networks. Most of the existing techniques to detect transients in water distribution systems use asynchronous methods, generating timeless information that limits the response capacity in critical situations. Therefore, an automatic transient detection system based on the Internet of Things (IoT) is proposed, capable of identifying overpressure or underpressure pulses in soft real-time, activating alarms to facilitate decision-making. This approach helps maintain the safety of the water distribution system and prevent leaks in the network. Furthermore, a model of the transient behavior of pressure and flow is presented by linearizing the water hammer equations from the Laplace transform, thus generating a transfer function that describes the algebraic relationship between the outlet and inlet of the hydraulic system.â¢The transient analysis of the hydraulic system prototype underscores its high sensitivity to initial conditions, attributed to turbulence. This observation suggests the possible presence of a dynamic strange attractor related to water hammer phenomena in pressure pipes.â¢The methodology involving transfer functions and state-space models enables the assessment of how leaks impact the transient responses of the system, including the magnitude, duration, and frequency of disturbances generated by them.â¢The proposed method introduces a dynamic transfer function capable of identifying instantaneous changes over time in terms of flow and pressure.
RESUMEN
This work proposes an implementation of the SHA-256, the most common blockchain hash algorithm, on a field-programmable gate array (FPGA) to improve processing capacity and power saving in Internet of Things (IoT) devices to solve security and privacy issues. This implementation presents a different approach than other papers in the literature, using clustered cores executing the SHA-256 algorithm in parallel. Details about the proposed architecture and an analysis of the resources used by the FPGA are presented. The implementation achieved a throughput of approximately 1.4 Gbps for 16 cores on a single FPGA. Furthermore, it saved dynamic power, using almost 1000 times less compared to previous works in the literature, making this proposal suitable for practical problems for IoT devices in blockchain environments. The target FPGA used was the Xilinx Virtex 6 xc6vlx240t-1ff1156.
RESUMEN
The development of neuroscientific techniques enabling the recording of brain and peripheral nervous system activity has fueled research in cognitive science. Recent technological advancements offer new possibilities for inducing behavioral change, particularly through cost-effective Internet-based interventions. However, limitations in laboratory equipment volume have hindered the generalization of results to real-life contexts. The advent of Internet of Things (IoT) devices, such as wearables, equipped with sensors and microchips, has ushered in a new era in behavior change techniques. Wearables, including smartwatches, electronic tattoos, and more, are poised for massive adoption, with an expected annual growth rate of 55% over the next five years. These devices enable personalized instructions, leading to increased productivity and efficiency, particularly in industrial production. Additionally, the healthcare sector has seen a significant demand for wearables, with over 80% of global consumers willing to use them for health monitoring. This research explores the primary biometric applications of wearables and their impact on users' well-being, focusing on the integration of behavior change techniques facilitated by IoT devices. Wearables have revolutionized health monitoring by providing real-time feedback, personalized interventions, and gamification. They encourage positive behavior changes by delivering immediate feedback, tailored recommendations, and gamified experiences, leading to sustained improvements in health. Furthermore, wearables seamlessly integrate with digital platforms, enhancing their impact through social support and connectivity. However, privacy and data security concerns must be addressed to maintain users' trust. As technology continues to advance, the refinement of IoT devices' design and functionality is crucial for promoting behavior change and improving health outcomes. This study aims to investigate the effects of behavior change techniques facilitated by wearables on individuals' health outcomes and the role of wearables in promoting a healthier lifestyle.
RESUMEN
The traditional aviary decontamination process involves farmers applying pesticides to the aviary's ground. These agricultural defenses are easily dispersed in the air, making the farmers susceptible to chronic diseases related to recurrent exposure. Industry 5.0 raises new pillars of research and innovation in transitioning to more sustainable, human-centric, and resilient companies. Based on these concepts, this paper presents a new aviary decontamination process that uses IoT and a robotic platform coupled with ozonizer (O3) and ultraviolet light (UVL). These clean technologies can successfully decontaminate poultry farms against pathogenic microorganisms, insects, and mites. Also, they can degrade toxic compounds used to control living organisms. This new decontamination process uses physicochemical information from the poultry litter through sensors installed in the environment, which allows accurate and safe disinfection. Different experimental tests were conducted to construct the system. First, tests related to measuring soil moisture, temperature, and pH were carried out, establishing the range of use and the confidence interval of the measurements. The robot's navigation uses a back-and-forth motion that parallels the aviary's longest side because it reduces the number of turns, reducing energy consumption. This task becomes more accessible because of the aviaries' standardized geometry. Furthermore, the prototype was tested in a real aviary to confirm the innovation, safety, and effectiveness of the proposal. Tests have shown that the UV + ozone combination is sufficient to disinfect this environment.
Asunto(s)
Robótica , Animales , Aves de Corral , Rayos Ultravioleta , Pollos , Descontaminación/métodos , Desinfección/métodos , Ozono/química , Internet de las CosasRESUMEN
The incursion of low-cost sensors (LCS) for monitoring particulate matter in different fractions of particles (PM10, PM2.5, and PM1) allows the characterization of the concentration levels of specific sources or events, including the analysis of ultrafine fractions (PM1). Several studies have documented adverse effects on human health due to exposure to PM1, such as morbidity and mortality from respiratory, cardiovascular, and, in some cases, carcinogenic diseases. Hence, studying the concentration levels and the sources that cause PM1 is imperative. LCS is an alternative to understanding contaminant concentration levels by considering spatial and temporal community dynamics by monitoring critical zones. Furthermore, collecting and managing large amounts of data through automatic processing and analysis generates information to support decision-making to reduce exposure and risks to people's health. The dataset presents the concentration level of PM1 (µg/m3) calculated from the particles of size 0.03 µm, 0.05 µm, and 1.0 µm recorded and counted by the sensor in a sample per minute for 24 h for seven continuous days. The values of the meteorological factors of relative humidity, temperature, and heat index complement these attributes. The dataset comprises records collected (in the same period) at four particulate matter monitoring stations, which compose an LCS network supported by Internet of Things (IoT) technologies. The data collection points were located in different areas of Reynosa, Mexico, considering strategic places for monitoring environmental pollution, such as industrial parks, residential areas, avenues with high vehicular traffic and transportation of heavy cargo, and an airport.
RESUMEN
In this study, we propose a method based on phase space reconstruction to estimate the short-term future behavior of pressure signals in pipelines. The pressure time series data were obtained from an IoT experimental model conducted in the laboratory. The proposed hydraulic system demonstrated the presence of traces of weak chaos in the time series of the pressure signal. Fractal dimension analysis revealed a complex fractal structure in the data, indicating the existence of nonlinear dynamics. Similarly, Lyapunov coefficients, divergent trajectories, and autocorrelation analysis confirmed the presence of weak chaos in the time series. The results demonstrated the existence of apparently chaotic patterns that follow the theory proposed by Kolmogorov for deterministic dynamic systems that exhibit apparently random behaviors. Phase space reconstruction allowed us to show the dynamic characteristics of the signal so that short-term predictions were stable. Finally, the study of strange attractors in pipeline pressure time series can have significant contributions to anomaly detection.â¢A methodology is proposed for the reconstruction of the phase space to estimate the short-term future behavior of pressure signals in pipelines in real time.â¢The analysis of the proposed hydraulic system revealed some indications of weak chaos in the time series of the pressure signal obtained experimentally.â¢The methodology implemented and the results of this study showed that the short-term predictions were very accurate and consistent; Chaotic patterns were also identified that support the theory proposed by Kolmogorov.
RESUMEN
The proliferation of radio frequency (RF) devices in contemporary society, especially in the fields of smart homes, Internet of Things (IoT) gadgets, and smartphones, underscores the urgent need for robust identification methods to strengthen cybersecurity. This paper delves into the realms of RF fingerprint (RFF) based on applying the Jensen-Shannon divergence (JSD) to the statistical distribution of noise in RF signals to identify Bluetooth devices. Thus, through a detailed case study, Bluetooth RF noise taken at 5 Gsps from different devices is explored. A noise model is considered to extract a unique, universal, permanent, permanent, collectable, and robust statistical RFF that identifies each Bluetooth device. Then, the different JSD noise signals provided by Bluetooth devices are contrasted with the statistical RFF of all devices and a membership resolution is declared. The study shows that this way of identifying Bluetooth devices based on RFF allows one to discern between devices of the same make and model, achieving 99.5% identification effectiveness. By leveraging statistical RFFs extracted from noise in RF signals emitted by devices, this research not only contributes to the advancement of the field of implicit device authentication systems based on wireless communication but also provides valuable insights into the practical implementation of RF identification techniques, which could be useful in forensic processes.
RESUMEN
Designing and deploying telecommunications and broadcasting networks in the challenging terrain of the Amazon region pose significant obstacles due to its unique morphological characteristics. Within low-power wide-area networks (LPWANs), this research study introduces a comprehensive approach to modeling large-scale propagation loss channels specific to the LoRaWAN protocol operating at 915 MHz. The objective of this study is to facilitate the planning of Internet of Things (IoT) networks in riverside communities while accounting for the mobility of end nodes. We conducted extensive measurement campaigns along the banks of Universidade Federal do Pará, capturing received signal strength indication (RSSI), signal-to-noise ratio (SNR), and geolocated point data across various spreading factors. We fitted the empirical close-in (CI) and floating intercept (FI) propagation models for uplink path loss prediction and compared them with the Okumura-Hata model. We also present a new model for path loss with dense vegetation. Furthermore, we calculated received packet rate statistics between communication links to assess channel quality for the LoRa physical layer (PHY). Remarkably, both CI and FI models exhibited similar behaviors, with the newly proposed model demonstrating enhanced accuracy in estimating radio loss within densely vegetated scenarios, boasting lower root mean square error (RMSE) values than the Okumura-Hata model, particularly for spreading factor 9 (SF9). The radius coverage threshold, accounting for node mobility, was 945 m. This comprehensive analysis contributes valuable insights for the effective deployment and optimization of LoRa-based IoT networks in the intricate environmental conditions of the Amazon region.
RESUMEN
The increasing demand for water and worsening climate change place significant pressure on this vital resource, making its preservation a global priority. Water quality monitoring programs are essential for effectively managing this resource. Current programs rely on traditional monitoring approaches, leading to limitations such as low spatiotemporal resolution and high operational costs. Despite the adoption of novel monitoring approaches that enable better data resolution, the public's comprehension of water quality matters remains low, primarily due to communication process deficiencies. This study explores the advantages and challenges of using Internet of Things (IoT) and citizen science as alternative monitoring approaches, emphasizing the need for enhancing public communication of water quality data. Through a systematic review of studies implemented on-field, we identify and propose strategies to address five key challenges that IoT and citizen science monitoring approaches must overcome to mature into robust sources of water quality information. Additionally, we highlight three fundamental problems affecting the water quality communication process and outline strategies to convey this topic effectively to the public.
Asunto(s)
Ciencia Ciudadana , Internet de las Cosas , Calidad del Agua , ComunicaciónRESUMEN
In recent years, the rate of urbanization has increased enormously, precipitating an escalating demand for improved services and applications in urban areas to improve the quality of life. In the Internet of Things (IoT)era, cities are transforming into smart urban centers. These cities incorporate connected devices, such as intelligent public lighting systems, to enhance their urban infrastructure. Therefore, this work explores the transformative potential of an IoT-enabled smart lighting system in urban environments, emphasizing its essential role in enhancing safety, economy, and sustainability. In this sense, LoRaCELL (Long-Range Cell) is introduced. LoRaCELL is an innovative system that utilizes edge devices for data collection, such as light intensity, humidity, temperature, air quality, solar ultraviolet radiation, ammeter, and voltmeter. It stands as a pioneering solution for intelligent public lighting systems, contributing to advancing IoT-driven urban development. The outcomes showed that the proposed system could successfully synchronize the devices with each other and send IoT sensing data at a low cost compared to traditional technologies such as LoRaWAN.
RESUMEN
Noise pollution is a growing problem in urban areas, and it is important to study and evaluate its impact on human health and well-being. This work presents the design of a low-cost IoT model and implementation of two prototypes to collect noise level data in a specific area of the regional center of Chiriquí, at the Technological University of Panama that can be replicated to create a noise monitoring network. The prototypes were designed using Autodesk Fusion 360, and the data were stored in a MySQL database. Microsoft Excel and ArcGIS Pro were used to analyze the data, generate graphs, and display the information on maps. The results of the analysis can be used to develop strategies to reduce noise pollution and improve the quality of life in urban areas.
RESUMEN
The usage scenarios defined in the ITU-M2150-1 recommendation for IMT-2020 systems, including enhanced Mobile Broadband (eMBB), Ultra-reliable Low-latency Communication (URLLC), and massive Machine Type Communication (mMTC), allow the possibility of accessing different services through the set of Radio Interface Technologies (RITs), Long-term Evolution (LTE), and New Radio (NR), which are components of RIT. The potential of the low and medium frequency bands allocated by the Federal Communications Commission (FCC) for the fifth generation of mobile communications (5G) is described. In addition, in the Internet of Things (IoT) applications that will be covered by the case of use of the mMTC are framed. In this sense, a propagation channel measurement campaign was carried out at 850 MHz and 5.9 GHz in a covered corridor environment, located in an open space within the facilities of the Pedagogical and Technological University of Colombia campus. The measurements were carried out in the time domain using a channel sounder based on a Universal Software Radio Peripheral (USRP) to obtain the received signal power levels over a range of separation distances between the transmitter and receiver from 2.00 m to 67.5 m. Then, a link budget was proposed to describe the path loss behavior as a function of these distances to obtain the parameters for the close-in free space reference distance (CI) and the floating intercept (FI) path loss prediction models. These parameters were estimated from the measurements made using the Minimum Mean Square Error (MMSE) approach. The estimated path loss exponent (PLE) values for both the CI and FI path loss models at 850 MHz and 3.5 GHz are in the range of 2.21 to 2.41, respectively. This shows that the multipath effect causes a lack of constructive interference to the received power signal for this type of outdoor corridor scenario. These results can be used in simulation tools to evaluate the path loss behavior and optimize the deployment of device and sensor network infrastructure to enable 5G-IoT connectivity in smart university campus scenarios.
RESUMEN
The Internet of Things (IoT), projected to exceed 30 billion active device connections globally by 2025, presents an expansive attack surface. The frequent collection and dissemination of confidential data on these devices exposes them to significant security risks, including user information theft and denial-of-service attacks. This paper introduces a smart, network-based Intrusion Detection System (IDS) designed to protect IoT networks from distributed denial-of-service attacks. Our methodology involves generating synthetic images from flow-level traffic data of the Bot-IoT and the LATAM-DDoS-IoT datasets and conducting experiments within both supervised and self-supervised learning paradigms. Self-supervised learning is identified in the state of the art as a promising solution to replace the need for massive amounts of manually labeled data, as well as providing robust generalization. Our results showcase that self-supervised learning surpassed supervised learning in terms of classification performance for certain tests. Specifically, it exceeded the F1 score of supervised learning for attack detection by 4.83% and by 14.61% in accuracy for the multiclass task of protocol classification. Drawing from extensive ablation studies presented in our research, we recommend an optimal training framework for upcoming contrastive learning experiments that emphasize visual representations in the cybersecurity realm. This training approach has enabled us to highlight the broader applicability of self-supervised learning, which, in some instances, outperformed supervised learning transferability by over 5% in precision and nearly 1% in F1 score.
RESUMEN
The Industrial Revolution 4.0 has catapulted the integration of advanced technologies in industrial operations, where interconnected systems rely heavily on sensor information. However, this dependency has revealed an essential vulnerability: Sabotaging these sensors can lead to costly and dangerous interruptions in the production chain. To address this threat, we introduce an innovative methodological approach focused on developing an anomaly detection algorithm specifically designed to track manipulations in industrial sensors. Through a series of meticulous tests in an industrial environment, we validate the robustness and accuracy of our proposal. What distinguishes this study is its unique adaptability to various sensor conditions, achieving high detection accuracy and prompt response. Our algorithm demonstrates superiority in accuracy and sensitivity compared to previously established methodologies. Beyond detection, we incorporate a proactive alert and response system, guaranteeing timely action against detected anomalies. This work offers a tangible solution to a growing challenge. It lays the foundation for strengthening security in industrial systems of the digital age, harmonizing efficiency with protection in the Industry 4.0 landscape.
RESUMEN
Context: The technological advancement of the Internet of Things (IoT) creates opportunities in various social sectors. Patients in clinics or home care have their comfort and safety enhanced with remote monitoring, sensors and applications that control and transfer patient data. These applications must be trustworthy, since they deal with sensitive data. Purpose: The purpose of this work is to identify gaps in trustworthiness, availability, effectiveness, security and other attributes. Also, to highlight challenges and opportunities for research and give guidance on choosing the right technology or application based on the resources available to support patients and doctors, protocol of communication and maturity level of these technologies. Methodology: This work presents a systematic review of the literature following four steps: Definition of the Research Questions, Conduct Search, Screening of Papers, and Data Extraction and Mapping Process. Results: Based on the articles studied, it was possible to answer important questions about eHealth applications. The results highlight how eHealth applications can enhance patient care by monitoring health data and supporting doctors' decision-making with a reasonable level of trustworthiness. Additionally, the results demonstrate how applications can notify external caregivers in emergencies and assist in diagnosis and treatment of illnesses. However, these applications still face problems related to sensor lifetime, medical data sharing, interoperability and lack of standardization. Finally, we suggest a literature mapping to support the choice of technologies based on resources available, communication protocol and technological maturity. Conclusion: This work carries out a systematic literature review to discuss state-of-the-art eHealth applications and gather new information of current research. In this process it was possible to show how these applications work, map out their main technological characteristics to assist the decision-making process for future works and uncover eHealth applications' strengths, future perspectives and challenges, specifically related to the high level of trustworthiness necessary.
RESUMEN
In an increasingly technology-driven world, the security of Internet-of-Things systems has become a top priority. This article presents a study on the implementation of security solutions in an innovative manufacturing plant using IoT and machine learning. The research was based on collecting historical data from telemetry sensors, IoT cameras, and control devices in a smart manufacturing plant. The data provided the basis for training machine learning models, which were used for real-time anomaly detection. After training the machine learning models, we achieved a 13% improvement in the anomaly detection rate and a 3% decrease in the false positive rate. These results significantly impacted plant efficiency and safety, with faster and more effective responses seen to unusual events. The results showed that there was a significant impact on the efficiency and safety of the smart manufacturing plant. Improved anomaly detection enabled faster and more effective responses to unusual events, decreasing critical incidents and improving overall security. Additionally, algorithm optimization and IoT infrastructure improved operational efficiency by reducing unscheduled downtime and increasing resource utilization. This study highlights the effectiveness of machine learning-based security solutions by comparing the results with those of previous research on IoT security and anomaly detection in industrial environments. The adaptability of these solutions makes them applicable in various industrial and commercial environments.