scispace - formally typeset
Search or ask a question

Showing papers on "Communications protocol published in 2022"


Journal ArticleDOI
TL;DR: In this article , the authors analyze the potential replay-attack cyberattacks that can occur on a SECS/GEM system and design a detection mechanism to protect SECS-GEM communications from replay attacks.
Abstract: Starting from the First Industrial Revolution to the current and Fourth Industrial Revolution (or Industry 4.0), various industrial machines are present in the market and manufacturing companies. As standardized protocols have become increasingly popular, more utilities are switching to Internet Protocol (IP)-based systems for wide-area communication. SECS/GEM is one of the standards that permit industries to collect information directly from the machines, either using RS323 or TCP/IP communication. TCP/IP communication is becoming more critical than ever, especially given our accelerated digital transformation and increasing reliance on communication technologies. The growth of IT is accelerating with cyberthreats as well. In contrast, security features in the SECS/GEM protocol may be neglected by some companies as it is only used in factories and not mostly used in the outside world. However, communication of SECS/GEM is highly susceptible to various cyberattacks. This paper analyzes the potential replay-attack cyberattacks that can occur on a SECS/GEM system. In replay attacks, this paper supposes an adversary that wants to damage an operation-based control system in an ongoing condition. The adversary has the ability to capture messages to watch and record their contents for a predetermined amount of time, record them, and then replay them while attacking in order to inject an exogenous control input undetected. The paper’s objectives are to prove that SECS/GEM communication is vulnerable to cyberattack and design a detection mechanism to protect SECS/GEM communications from replay attacks. The methodology implements a simulation of the replay-attack mechanism on SECS/GEM communication. The results indicate that the design mechanism detected replay attacks against SECS/GEM communications and successfully prevented them.

14 citations


Journal ArticleDOI
TL;DR: In this paper, a robust blockchain-based lightweight distributed architecture (RB-LDA) for 5G-enabled networks is presented, where the identity management continuously monitors the activities of IoT devices to perform a better auditing process.

8 citations


Proceedings ArticleDOI
TL;DR: In this paper , the authors compared the technical properties and investigated the practical applications of five different wireless communication protocols that are commonly used in IoT applications: ZigBee, Wi-Fi, Sigfox, NB-IoT, and LoRaWAN.
Abstract: IoT based smart agriculture systems are important for efficient usage of lands, water, and energy resources. Wireless communication protocols constitute a critical part of smart agriculture systems because the fields, in general, cover a large area requiring system components to be placed at distant locations. There are various communication protocols with different features that can be utilized in smart agriculture applications. When designing a smart agriculture system, it is required to carefully consider the features of possible protocols to make a suitable and optimal selection. Therefore, this review paper aims to underline the specifications of the wireless communication protocols that are widely used in smart agriculture applications. Furthermore, application-specific requirements, which may be useful during the design stage of the smart agriculture systems, are highlighted. To accomplish these aims, this paper compares the technical properties and investigates the practical applications of five different wireless communication protocols that are commonly used in IoT applications: ZigBee, Wi-Fi, Sigfox, NB-IoT, and LoRaWAN. In particular, the inconsistencies in the technical properties of these protocols reported in different resources have been highlighted and the reason for this situation has been discussed. Considering the features offered by the protocols and the requirements of smart agriculture applications, the appropriateness of a particular protocol to a particular smart agriculture application is examined. In addition, issues about cost, communication quality, and hardware of the five protocols have been mentioned. The trending technologies with high potential for the future applications of smart agriculture have been introduced. In this context, the relation of the technologies like aerial systems, cellular communication, and big data analytics with wireless have been specified. Finally, the leading protocol and the smart agriculture application area have been highlighted through observing the year-based distribution of the recent publications. It has been shown that usage of LoRaWAN protocol has become more widespread in recent years.

7 citations


Journal ArticleDOI
TL;DR: In this article , a general network communication protocol design based on batched network coding (BNC), which includes the existing framework as a special case and whose design can be guided by channel coding theory, is introduced.
Abstract: Most existing network communication systems, such as the Internet, are built around the TCP/IP protocol stack. However, TCP/IP cannot effectively support the upcoming network communication systems with more wireless communication links and higher requirements in terms of throughput, latency, and reliability. In this article, we introduce a general network communication protocol design based on batched network coding (BNC), which includes the existing framework as a special case and whose design can be guided by channel coding theory. BNC-based protocols can have significant throughput gain for single-hop or multihop wireless communications and provide better trade-off among throughput, latency and reliability.

5 citations



Journal ArticleDOI
01 Sep 2022-Sensors
TL;DR: This paper critically explores the literature on cyber security for in-vehicle communication focusing on technical architecture, methodologies, challenges, and possible solutions and proposes a multi-layer secure framework as a protocol and use case-independent in-Vehicle communication solution.
Abstract: In-vehicle communication has become an integral part of today’s driving environment considering the growing add-ons of sensor-centric communication and computing devices inside a vehicle for a range of purposes including vehicle monitoring, physical wiring reduction, and driving efficiency. However, related literature on cyber security for in-vehicle communication systems is still lacking potential dedicated solutions for in-vehicle cyber risks. Existing solutions are mainly relying on protocol-specific security techniques and lacking an overall security framework for in-vehicle communication. In this context, this paper critically explores the literature on cyber security for in-vehicle communication focusing on technical architecture, methodologies, challenges, and possible solutions. In-vehicle communication network architecture is presented considering key components, interfaces, and related technologies. The protocols for in-vehicle communication have been classified based on their characteristics, and usage type. Security solutions for in-vehicle communication have been critically reviewed considering machine learning, cryptography, and port-centric techniques. A multi-layer secure framework is also developed as a protocol and use case-independent in-vehicle communication solution. Finally, open challenges and future dimensions of research for in-vehicle communication cyber security are highlighted as observations and recommendations.

4 citations


Journal ArticleDOI
TL;DR: The network simulator successfully reads and wirelessly transmits voltage or power consumption using the Zigbee protocol and a cooperative communication system and the following conclusions were reached.
Abstract: A smart meter is an electronic device that accurately tracks your energy consumption and transmits that data to your energy provider so that you can be billed. The smart meters allow the central system and the meter to communicate in both directions. This two-way communication feature distinguishes the advanced metering infrastructure (AMI) in this case from automatic meter reading (AMR). This paper employs a hybrid system based on the Zigbee protocol, the Zigbee used to send messages between the smart meter and the utility company. To successfully complete tasks in this scenario, a cooperative communication system utilizing TDMA is used. The outcomes of Zigbee performance are measured using well-known metrics, also known as performance metrics. Many performance indicators have been chosen for performance evaluation: throughput, average end-to-end delivery ratio, and (PDR). The following conclusions were reached: End-to-end latency was 5.01 milliseconds, throughput was 42.63 kbps, and PDR was 97.19 percent. The network simulator successfully reads and wirelessly transmits voltage or power consumption using the Zigbee protocol and a cooperative communication system.

4 citations



Book ChapterDOI
01 Jan 2022
TL;DR: In this article , focused beam routing (FBR) protocol for UOWC in The ONE simulator for different FBR angles is evaluated. And the results show that the highest delivery probability is achieved for $$15^{\circ }$$ , while for angles over $$30^{\Circ }$$, the values drastically decreased, because of the short communication ranges.
Abstract: Recently, underwater communication has been developing in many ways, such as wired communication, underwater acoustic communication (UAC), underwater radio wave wireless communication (URWC), underwater optical wireless communication (UOWC). The main issue in underwater communication is the communication interruption because signals are affected by various factors in underwater environment. Consequently, communication links are unstable and real time communication is almost impossible. Therefore, we considered combining both underwater communication and delay tolerant network technologies. In this paper, we present the evaluation of focused beam routing (FBR) protocol for UOWC in The ONE simulator for different FBR angles. The results show that the highest delivery probability is achieved for $$15^{\circ }$$ , while for angles over $$30^{\circ }$$ , the values drastically decreased, because of the short communication ranges. Furthermore, when we used narrow FBR angles, both latency and overhead decreased. From these results, we can claim that FBR protocol can be used for effective communication for UOWC.

3 citations


Proceedings ArticleDOI
25 Jan 2022
TL;DR: In this paper , the authors discuss the most recent cutting-edge research initiatives in Industrial IoT (IIoT) and discuss several communication protocols used in IIoT, such as HTTP, MQTT, CoAP, XMPP, AMQP, and MODBUS.
Abstract: The Industrial IoT (IIoT) system enables the industries to gather and evaluate massive amounts of data, which can then be utilized, legalized, and improved to provide new sorts of services. This survey discusses the most recent cutting-edge research initiatives in IIoT. Surprisingly, the study, which includes architecture of IIoT, communication protocols, and frameworks, is described in depth. The primary aim of this survey is to examine the various communication protocols utilized in IIoT and its applications. The ideas of IIoT, IoT, and Industry 4.0 are analyzed and compared in this analysis. This study discusses several communication protocols used in IIoT, such as HTTP, MQTT, CoAP, XMPP, AMQP, and MODBUS. On the basis of assuring dependability, these techniques may enhance lifetime and shorten delay. The implementation of protocols based on network topology, as well as their computational and latency performances are analyzed and compared. These protocols are utilized in IIoT for various scenarios in many areas based on the applications and communication networks. The IIoT is addressed in this paper, which can assist researchers to comprehend the idea of IIoT and the latest research activities in IIoT. At last, the protocols utilized in IIoT communication are highlighted.

3 citations



Journal ArticleDOI
18 Feb 2022-Energies
TL;DR: A novel algorithm is presented that combines finite automaton determinism modeling consecutive admissible messages with a time-domain model allowing for random deviations of regularity and an anomaly detection method for cyberattack detection that utilizes stochastic elements, such as time-to-response and time-between-messages.
Abstract: This paper demonstrates the effectiveness of using anomaly detection in cyclic communication as a method aimed at protecting industrial installations from steganographic communication and a wide range of cyberattacks. The analysis was performed for a method based on deterministic finite automaton and the authors’ method using cycles. In this paper, we discuss the cycle detection algorithm and graph construction as well as demonstrate an anomaly detection method for cyberattack detection that utilizes stochastic elements, such as time-to-response and time-between-messages. We present a novel algorithm that combines finite automaton determinism modeling consecutive admissible messages with a time-domain model allowing for random deviations of regularity. The study was conducted for several test scenarios, including C&C steganographic channels generated using the Modbus TCP/IP protocol. Experimental results demonstrating the effectiveness of the algorithms are presented for both methods. All algorithms described in this paper are implemented and run as part of a passive warden system embedded in a bigger commercial IDS (intrusion detection system).

Journal ArticleDOI
24 Aug 2022-Sensors
TL;DR: This paper examines the compatibility and real-time responsiveness capabilities, in a diverse, service-oriented architecture, for the major automotive IoT Ethernet-based communication technologies, and confirms the compatibility between the targeted technologies.
Abstract: The architectural approach for complex communication systems must adapt quickly and take into consideration the increasing set of requirements for every industrial field. The automotive domain is evolving toward the electrification era, with massive technological transformations being realized on all architectural, hardware, and software levels. The legacy usage of exclusively microcontrollers is altered by adopting microprocessors with extended functionalities, reshaping the development structure. Although new hardware capabilities are available and Ethernet communication protocols can contribute to a new range of use-cases for intra-car or for vehicle-to-X (V2X) communication, the implications of using multiple protocols that cover different types of requirements, in the same architecture, are not fully determined. The importance of establishing clear expectations for intelligent communication systems considering various technological and architectural factors is significant for future improvements. In the current paper, we examine the compatibility and real-time responsiveness capabilities, in a diverse, service-oriented architecture, for the major automotive IoT Ethernet-based communication technologies. The feasibility analysis is materialized in a multi-protocol gateway solution that facilitates data exchange between entities with different technological origins. Scalable Service-Oriented Middleware over IP (SOME/IP) is considered the relevant protocol in the automotive domain, alongside the Data Distribution Service (DDS), which combines automotive and IoT applicability. The enhanced Communication Abstraction Layer (eCAL) middleware is added to the mix as an alternative solution for future communication scenarios. The obtained results confirm the compatibility between the targeted technologies, offering a clear understanding regarding the limits of a complex multi-protocol communication system. The defined service-oriented architecture offers efficient data exchanges in a gateway context, also allowing the exploration of the real-time capabilities.

Book ChapterDOI
01 Jan 2022
TL;DR: In this paper , the authors describe the formal verification of a complex communication protocol that coordinates agents merging maps of their environment, which was used by the LFC team in the 2019 edition of the Multi-Agent Programming Contest (MAPC).
Abstract: Communication is a critical part of enabling multi-agent systems to cooperate. This means that applying formal methods to protocols governing communication within multi-agent systems provides useful confidence in its reliability. In this paper, we describe the formal verification of a complex communication protocol that coordinates agents merging maps of their environment. The protocol was used by the LFC team in the 2019 edition of the Multi-Agent Programming Contest (MAPC). Our specification of the protocol is written in Communicating Sequential Processes (CSP), which is a well-suited approach to specifying agent communication protocols due to its focus on concurrent communicating systems. We validate the specification’s behaviour using scenarios where the correct behaviour is known, and verify that eventually all the maps have merged.

Journal ArticleDOI
TL;DR: In this article , the authors propose a methodology for formal synthesis of successful attacks against two well-known protocols, the Alternating Bit Protocol (ABP) and the Transmission Control Protocol (TCP), where the attacker can always eventually win, called For-all attacks.
Abstract: There is an increasing need to study the vulnerability of communication protocols in distributed systems to malicious attacks that attempt to violate properties such as safety or nonblockingness. In this paper, we propose a common methodology for formal synthesis of successful attacks against two well-known protocols, the Alternating Bit Protocol (ABP) and the Transmission Control Protocol (TCP), where the attacker can always eventually win, called For-all attacks. This generalizes previous work on the synthesis of There-exists attacks for TCP, where the attacker can sometimes win. We model the ABP and TCP protocols and system architecture by finite-state automata and employ the supervisory control theory of discrete event systems to pose and solve the synthesis of For-all attacks, where the attacker has partial observability and controllability of the system events. We consider several scenarios of person-in-themiddle attacks against ABP and TCP and present the results of attack synthesis using our methodology for each case.

Journal ArticleDOI
TL;DR: This article presents a distributed connectivity maintenance algorithm for a multiagent system composed of unmanned underwater vehicles (UUVs) and gives formal proofs of the results that establish network connectivity for the presented algorithm under suitable assumptions on each agent’s motion planner and controller.
Abstract: This article presents a distributed connectivity maintenance algorithm for a multiagent system composed of unmanned underwater vehicles (UUVs). We consider a homogeneous network of UUVs that move on a 2-D plane with bounded linear speeds. The time-division multiple-access protocol, which is a commonly used communication protocol for UUVs, is used by the agents in the network to communicate with each other. Due to the communication constraints imposed by the protocol, the agents do not have access to the current positions of their neighbors. This presents a significant challenge in developing a connectivity maintenance algorithm that can be formally verified. Using only local information from an agent’s neighbors, the algorithm provides motion constraints for each agent in the network, which can then be used by each UUV’s motion planner to plan a connectivity-preserving reference trajectory. In addition to providing mathematical proofs expressed in a way that is typical in the systems and control community, we give formal proofs of the results that establish network connectivity for the presented algorithm under suitable assumptions on each agent’s motion planner and controller. The formal proofs are carried out using the KeYmaera X theorem prover, which is an interactive formal verification tool for hybrid systems. This article also highlights the utility of formal verification tools in identifying scenarios that could be overlooked when employing proofs that are not carried out in a formal system for complex distributed algorithms such as the one presented in this article.

Proceedings ArticleDOI
09 Oct 2022
TL;DR: In this article , a communication protocol is developed between gate drivers and a local controller in a cell of a modular multilevel converter with high synchronization accuracy based on clock signal sharing and Precise Time Protocol.
Abstract: Communication inside a power converter could benefit various ways. If established between a local controller and a gate driver, it creates hardware abstraction, meaning that the behavior of power stage terminals is independent of hardware design. Flexibility is another important communication benefit since different data could be exchanged between a controller and the gate drivers. Since modern gate drivers are equipped with different sensors for protection purposes, combined with communication, data sampled from gate driver sensors could be reused for control purposes, allowing for the implementation of distributed control. This paper gives an example of a communication protocol developed between gate drivers and local controller in a cell of a modular multilevel converter. Communication is developed on the low-cost physical layer but with high synchronization accuracy based on clock signal sharing and Precise Time Protocol.

Journal ArticleDOI
TL;DR: In this article , the authors studied the application of the communication protocols defined by the IEC61850 standard in Intelligent Electronic Devices (IEDs) by using a prototype testbed architecture running on a real-time digital device.
Abstract: Due to the increasing use of smart components in smart grids, interoperability among them is a crucial aspect to address. IEC61850 is a communication standard that has been already used in substations because of its instant data transfer and the ability to enable data exchange between a variety of smart energy-related digital technologies. This article studies the application of the communication protocols defined by the IEC61850 standard in Intelligent Electronic Devices (IEDs) by using a prototype testbed architecture running on a real-time digital device. The goal of this activity is to study the impact of smart simulations and the vulnerability in terms of cyber-security. This testbed includes the supervisor, the substation bus, and the process bus communication layer creating a local network exchanging data at distinct levels. Different fault protection scenarios are discussed using both physical and emulated IEDs, and the communication protocols implemented in each scenario are explained showing that additional delays are introduced. In the first two scenarios, the operation of the testbed using physical versus emulated IEDs is analyzed and compared, ensuring the robustness of this methodology in situations where the use of a physical IED would be unfeasible. In these scenarios, the functionality and robustness of the protection mechanisms and communication protocols are confirmed. In the third scenario vulnerability of smart grids that use IEC61850 as their primary communication protocol to data injection attacks is studied. Sniffing the local network, packets are captured and monitored. Spoofed data with the same structure are injected into the network to conduct false data injection attacks on the supervisory unit. Vulnerability to cyber attacks of the IEC61850 protocol in specific situations is shown.

Proceedings ArticleDOI
01 Aug 2022
TL;DR: In this article , the authors examined the scope of the Qu4lity project, the data communication protocols used by the pilots, the protocols used in TEKNOPAR, and the benefits, drawbacks, and application areas of different data communications protocols.
Abstract: Several key methods have been developed to transfer data accurately and completely. In this regard, a communication protocol specifies the rules for transmitting blocks of data between network nodes. This study examines in detail the scope of the Qu4lity project, the data communication protocols used by the pilots, the protocols used by TEKNOPAR, and the benefits, drawbacks, and application areas of different data communication protocols. Protocols were analysed against a number of technical criteria aimed at identifying the most appropriate procedure. Communication protocols were categorized considering the following features: technical qualifications such as transport protocol, coding format, message system, architecture, security, and scalability.

Book ChapterDOI
01 Jan 2022
TL;DR: In this paper, the authors introduce the security principles, the security issues in embedded systems, and the methodology to solve them, and conclude with current security standards for embedded systems and typical secured platform architecture.
Abstract: In past, most of the embedded systems are designed for dedicated functionality. They are stand-alone. However, with the advent of technological advances, most of these systems are not stand-alone but they are distributed. This caused everyone to think how to secure the embedded systems from hacking, intrusion, illegal data access, sabotage, and so on. These issues are well studied in Internet security. But, these techniques do not apply to different network protocols for embedded systems. No focus was given to the security of embedded hardware, firmware, embedded operating systems, and embedded applications, and embedded data. This chapter briefly introduces the security principles, the security issues in embedded systems, and the methodology to solve them. Section 14.2 introduces basic terminology, possible cyber-attacks on embedded systems, and needed security policies. Section 14.3 gets into details of security vulnerabilities in embedded systems and how to prevent them. Section 14.4 details basic security algorithms. Section 14.5 gives an example on how to implement security protocols on existing real-time network standards. The example is on authentication protocol implemented on CAN standard. Section 14.6 explains possible guidelines to secure embedded systems. The chapter concludes with current security standards for embedded systems and typical secured platform architecture.

Proceedings ArticleDOI
22 Jun 2022
TL;DR: This work aims to present an analysis between the MQTT-SN and LWM2M communication protocols, comparing their performance in the transmission of messages, with the help of the Node-RED tool.
Abstract: The Internet of Things (IoT) has become an integral part of the lifestyle of modern society and an important tool in many areas of business. In recent years, there has been a great need to connect new IoT devices to precision agriculture. Known as connected objects, it has been gaining more and more strength. As well as the adoption of IoT for agriculture, homes, smart cities, logistics, healthcare, manufacturing and others. There are also numerous concerns regarding the communication of these devices. With the ability to collect data, IoT technology becomes a valuable resource and care must be taken in the search for effective communication mechanisms. In this sense, this work aims to present an analysis between the MQTT-SN and LWM2M communication protocols, comparing their performance in the transmission of messages. The model was developed with the help of the Node-RED tool, which consists of flow-based programming in the evaluation and performance implemented at runtime. At the end of the simulations, it was possible to evaluate that the MQTTSN protocol presented better results in the tests performed.

Proceedings ArticleDOI
07 Apr 2022
TL;DR: The paper deals with the loose ends of Bundle Protocol and the need for further enhancement in DTN for accomplishing future interplanetary space missions.
Abstract: Disruption/Delay Tolerant Networking (DTN) is a growing protocol suite for transmitting information in challenging communication environments like space where conventional Internet doesn’t work well. The paper is an outcome of the research that begins with the history of Space Communication Protocols put forth by CCSDS (Consultative Committee for Space Data System), the need and deployment of DTN and extends up to testing and analysis of DTN Protocol in real-time scenarios. Bundle Protocol is the heart of DTN which is responsible for custody transfer. DTN has an upper edge over other protocols with respect to network management, security and quality-of-service. DTN Test Bed, DTN three-node configuration and NS2 Simulation Model give contact graphs and status reports at every node as a part of testing and analysing the performance of DTN compared to TCP. The paper deals with the loose ends of Bundle Protocol and the need for further enhancement in DTN for accomplishing future interplanetary space missions.

Book ChapterDOI
01 Jan 2022
TL;DR: In this article , the authors present an IIoT gateway to acquire data from industrial devices and through standard digital or analog inputs and outputs through RS-485 interface, which is based on an Arduino UNO board that incorporates an Ethernet module.
Abstract: AbstractNowadays, many industries have started to use different devices that allow the integration of process data through the internet to incorporate manufacturing into an Industry 4.0 scheme. In this regard, the present work involves the development of an IIoT Gateway to acquire data from industrial devices and through standard digital or analog inputs and outputs. The prototype provides bi-directional interaction with a remote station through Modbus RTU serial communications protocol under RS-485 interface. The implementation is based on an Arduino UNO board that incorporates an Ethernet module. The necessary functions are implemented in this board to establish communication and allow data management in higher layers under the MQTT protocol. A complementary monitoring interface was also developed using Node-RED. Several features were integrated within this interface, which includes an organized data displaying, real-time charts generation, and alarms that can be set and visualized based on the values of certain variables obtained through the developed gateway. The prototype and interface were tested to validate their operation and performance. The gateway is based on low-cost technologies and allows the integration of multiple protocols and industrial devices for possible future projects.KeywordsGatewayIndustrialIoTMQTTNode-RED

Journal ArticleDOI
TL;DR: The existing state of OT and IT security in SCADA systems by classifying the SCADA components among them is analysed and security recommendations based on current trends are provided and open research problems in SCada security are discussed.
Abstract: Industrial control systems (ICS) play a vital role in monitoring and controlling the plants like power grids, oil and gas industries, manufacturing industries, and nuclear power plants. Present research and development in information and communication technologies have changed the domains of industrial control systems from traditional electromagnetic to network- based digital systems. This domain shift has created better interfaces for communication between physical processes and the control units. Eventually, making the complex process of monitoring and controlling the industries easier, with the help of internet connections and computing technologies. The field instruments such as sensors and actuators and the physical processes in industries are controlled and monitored by programmable logic controllers (PLC), remote telemetric units (RTU), and supervisory control and data acquisition systems (SCADA) with the help of communication protocols. The seamless integration of the information technologies (IT) and operational technologies (OT) make the management of the industrial environment foster. However, the inclusion of new technologies that increase the number of internet connections, the new communication protocols, and interfaces that run on open-source software, brings up new threats and challenges in addition to existing vulnerabilities in these classical legacy-based heterogeneous hardware and software systems. Due to the increase in the number of security incidents on critical infrastructures, the security considerations for SCADA systems/ICS are gaining interest among researchers. In this paper, we provide a description of SCADA/ICS components, architecture, and communication protocols. Additionally, we discuss details of existing vulnerabilities in hardware, software, and communication protocols. Further, we highlight some prominent security incidents and their motives behind them. We analyse the existing state of OT and IT security in SCADA systems by classifying the SCADA components among them. Finally, we provide security recommendations based on current trends and also discuss open research problems in SCADA security.

Proceedings ArticleDOI
26 Jun 2022
TL;DR: In this article , an application of the Open Field Message Bus (OpenFMB) framework to simplify the communication layer in microgrids is presented, which leverages the OpenFMB protocol translation and data model extensions to reduce the complexity of microgrid communications.
Abstract: Microgrids require an extensive communication infrastructure to allow interoperability between the microgrid controller and assets. However, the lack of standardization of data structures combined with the variety of communication protocols poses several challenges to the implementation of a communication network. This paper presents an application of the open-source Open Field Message Bus (OpenFMB) framework to simplify the communication layer in microgrids. This work leverages the OpenFMB protocol translation and data model extensions to reduce the complexity in the microgrid communications. Conducted in a laboratory microgrid, the case study demonstrates how the OpenFMB provides predefined data models and simplifies the communication layer by providing information exchange between multiple legacy communication protocols.

Book ChapterDOI
01 Jan 2022
TL;DR: In this paper , the authors presented the Focused Beam Routing considering node Direction (FBRD) protocol for UOWC, which combines both underwater communication and delay tolerant network technologies.
Abstract: Recently, underwater communication has been developing in many ways, such as wired communication, underwater acoustic communication (UAC), underwater radio wave wireless communication (URWC), underwater optical wireless communication (UOWC). The main issue in underwater communication is the communication interruption because signals are affected by various factors in underwater environment. Consequently, communication links are unstable and real time communication is almost impossible. Therefore, we considered combining both underwater communication and delay tolerant network technologies. In this paper, we present the Focused Beam Routing considering node Direction (FBRD) protocol for UOWC, we use ONE simulator to evaluate the performance regarding delivery probability. The results show better results for FBR angles around 30 $$^\circ $$ , while if we use angles over 30 $$^\circ $$ , the delivery probability decreases, because of the short communication ranges. In addition, the proposed FBRD protocol not only achieved high delivery provability than FBR but also has lower hop counts.

Journal ArticleDOI
TL;DR: This paper introduces a proposed system to link a remote healthcare unit as it is inside the hospital, which was successfully implemented and tested and a high percentage of success data packets transfer was recorded within the network framework.
Abstract: COVID-19 altered the way of caregiving and the new pandemic forced the health systems to adapt new treatment protocols in which remote follow-up is essential. This paper introduces a proposed system to link a remote healthcare unit as it is inside the hospital. Two different network protocols; GSM and Wi-Fi were used to simulate the heath data transfer from the from two different geographical locations, using Raspberry Pi development board and Microcontroller units. Message Queuing Telemetry Transport (MQTT) protocol was employed to transfer the measured data from the healthcare unit to the hospital’s gateway. The gateway is used to route the aggregated health data from healthcare units to the hospital server, doctors’ dashboards, and the further processing. The system was successfully implemented and tested, where the experimental tests show that the remote healthcare units using a GSM network consumed about 900 mWh. A high percentage of success data packets transfer was recorded within the network framework as it reaches 99.89% with an average RTT of 7.5 milliseconds and a data transfer rate up to 12.3kbps.

Proceedings ArticleDOI
TL;DR: This paper gives an example of a power converter architecture that uses communication between nodes (gate drivers and the sensors) to achieve flexible and distributed control.
Abstract: Communication inside a power converter could be beneficial in a variety of ways. It naturally gives hardware abstraction, meaning that the behavior of power stage terminals is independent of hardware design. Flexibility is another important communication benefit, since different data could be exchanged between a controller, the gate drivers, and sensors. Since modern gate drivers are equipped with different sensors for protection purposes, in conjunction with communication, data sampled from gate driver sensors could be sent to the controller and reused for control purposes. Therefore, fewer sensors would be needed for the system, and controller hardware could be simplified. And finally, communication between different levels and nodes in the power electronics systems allows for the implementation of distributed control. This paper gives an example of a power converter architecture that uses communication between nodes (gate drivers and the sensors) to achieve flexible and distributed control.

Proceedings ArticleDOI
17 Jun 2022
TL;DR: The model and the communication protocol are designed in order to achieve low data exchange overhead and good flexibility regarding the enhancement of the devices with new data elements and functions and the implementations of both the device firmware and the remote system software show that the communication is performed in a reliable manner and continuous data logging is possible for long periods of time.
Abstract: The paper presents the results of the development of a device model and a communication protocol for use with devices and actuators in smart buildings and other similar environments such as smart classrooms. Considering the application field and its requirements, the paper shows how the model and the communication protocol are designed in order to achieve low data exchange overhead and good flexibility regarding the enhancement of the devices with new data elements and functions. At the present research stage, the paper targets serial-based connections established over USB or Bluetooth, over which multiple small data elements are regularly updated. The implementations of both the device firmware and the remote system software show that the communication is performed in a reliable manner and continuous data logging is possible for long periods of time. The future work will encompass the improvement of longer operations such as remote firmware upgrade, experiments with a packet-oriented data exchange, e.g. over UDP, and the inclusion of security features such as authentication and encryption.

Book ChapterDOI
01 Jan 2022
TL;DR: In this paper, a complex-product-oriented unified modeling language, called X Language, is introduced and a system model is presented to manage the IoT system based on X language.
Abstract: The Internet of Things combines (IoT) various information sensing devices to form a cross-domain network. In the IoT environment, the devices at the edge need to inter-communication with the server in the cloud. But the different devices use different communication protocols and operating systems, which can cause barriers, such as communication, operation, and registration. Model-Driven System Engineering (MDSE) provides a methodology to support the design, analysis, development, operation of complex systems. For the different characteristics of IoT devices, MDSE can support the modeling of device, task, service, and process. This paper introduces a complex-product-oriented unified modeling language, called X Language, and presents a system model to manage the IoT system based on X language. Block Definition Diagram (BDD) of X language is used to build the device model and server model. State Machine Diagram (SMD) of X language is used to build the process model of device and server operation. This work enables an IoT system to flexible and interoperability by the system-driven capability of X Language.