Cookies
O website necessita de alguns cookies e outros recursos semelhantes para funcionar. Caso o permita, o INESC TEC irá utilizar cookies para recolher dados sobre as suas visitas, contribuindo, assim, para estatísticas agregadas que permitem melhorar o nosso serviço. Ver mais
Aceitar Rejeitar
  • Menu
Publicações

Publicações por CRIIS

2024

Matter Protocol Integration Using Espressif's Solutions to Achieve Smart Home Interoperability

Autores
Mota, A; Serôdio, C; Valente, A;

Publicação
ELECTRONICS

Abstract
Smart home devices are becoming more popular over the years. A diverse range of appliances is being created, and Ambient Intelligence is growing in homes. However, there are various producers of these gadgets, different kinds of protocols, and diverse environments. The lack of interoperability reduces comfort of the user and turns into a barrier to smart home adoption. Matter is growing by constructing an open-source application layer protocol that can be compatible with all smart home ecosystems. In this article, a Matter overview is provided (namely, of the Commissioning stage), and a Matter Accessory using ESP32-S3 is developed referring to the manufacturer's SDKs and is inserted into an existent household ecosystem. Its behavior on the network is briefly analyzed, and interactions with the device are carried out. The simplicity of these tasks demonstrates accessibility for developers to create products, especially when it comes to firmware. Additionally, device commissioning and control are straightforward for the consumer. This capacity of gadget incorporation into diverse ecosystems using Matter is already on the market and might result in higher device production and enhanced smart home adoption.

2024

Efficient Runtime Firmware Update Mechanism for LoRaWAN Class A Devices

Autores
Neves, BP; Valente, A; Santos, VDN;

Publicação
ENG

Abstract
This paper presents an efficient and secure method for updating firmware in IoT devices using LoRaWAN network resources and communication protocols. The proposed method involves dividing the firmware into fragments, storing them in the application server's database, and transmitting them to remote IoT devices via downlink messages, without necessitating any changes to the device's class. This approach can be replicated across any IoT LoRaWAN device, offering a robust and scalable solution for large-scale firmware updates while ensuring data security and integrity. The proposed method significantly reduces the downtime of IoT devices and enhances the energy efficiency of the update process. The method was validated by updating a block in the program memory, associated to a specific functionality of the IoT end device. The associated Intel Hex file was segmented into 17 LoRaWAN downlink frames with an average size of 46 bytes. Upon receiving the complete firmware update, the microcontroller employs self-programming techniques that restrict the update process to specific rows of the program memory, avoiding interruptions or reboots. The update process was successfully completed in 51.33 ms, resulting in a downtime of 16.88 ms. This method demonstrates improved energy efficiency compared to existing solutions while preserving the communication network's capacity, making it an adequate solution for remote devices in LoRaWAN networks.

2024

Enhancing IoT Security in Vehicles: A Comprehensive Review of AI-Driven Solutions for Cyber-Threat Detection

Autores
Abreu, R; Simao, E; Serôdio, C; Branco, F; Valente, A;

Publicação
AI

Abstract
Background: The Internet of Things (IoT) has improved many aspects that have impacted the industry and the people's daily lives. To begin with, the IoT allows communication to be made across a wide range of devices, from household appliances to industrial machinery. This connectivity allows for a better integration of the pervasive computing, making devices smart and capable of interacting with each other and with the corresponding users in a sublime way. However, the widespread adoption of IoT devices has introduced some security challenges, because these devices usually run in environments that have limited resources. As IoT technology becomes more integrated into critical infrastructure and daily life, the need for stronger security measures will increase. These devices are exposed to a variety of cyber-attacks. This literature review synthesizes the current research of artificial intelligence (AI) technologies to improve IoT security. This review addresses key research questions, including: (1) What are the primary challenges and threats that IoT devices face?; (2) How can AI be used to improve IoT security?; (3) What AI techniques are currently being used for this purpose?; and (4) How does applying AI to IoT security differ from traditional methods? Methods: We included a total of 33 peer-reviewed studies published between 2020 and 2024, specifically in journal and conference papers written in English. Studies irrelevant to the use of AI for IoT security, duplicate studies, and articles without full-text access were excluded. The literature search was conducted using scientific databases, including MDPI, ScienceDirect, IEEE Xplore, and SpringerLink. Results were synthesized through a narrative synthesis approach, with the help of the Parsifal tool to organize and visualize key themes and trends. Results: We focus on the use of machine learning, deep learning, and federated learning, which are used for anomaly detection to identify and mitigate the security threats inherent to these devices. AI-driven technologies offer promising solutions for attack detection and predictive analysis, reducing the need for human intervention more significantly. This review acknowledges limitations such as the rapidly evolving nature of IoT technologies, the early-stage development or proprietary nature of many AI techniques, the variable performance of AI models in real-world applications, and potential biases in the search and selection of articles. The risk of bias in this systematic review is moderate. While the study selection and data collection processes are robust, the reliance on narrative synthesis and the limited exploration of potential biases in the selection process introduce some risk. Transparency in funding and conflict of interest reporting reduces bias in those areas. Discussion: The effectiveness of these AI-based approaches can vary depending on the performance of the model and the computational efficiency. In this article, we provide a comprehensive overview of existing AI models applied to IoT security, including machine learning (ML), deep learning (DL), and hybrid approaches. We also examine their role in enhancing the detection accuracy. Despite all the advances, challenges still remain in terms of data privacy and the scalability of AI solutions in IoT security. Conclusion: This review provides a comprehensive overview of ML applications to enhance IoT security. We also discuss and outline future directions, emphasizing the need for collaboration between interested parties and ongoing innovation to address the evolving threat landscape in IoT security.

2024

Arduino-Based Mobile Robotics for Fostering Computational Thinking Development: An Empirical Study with Elementary School Students Using Problem-Based Learning Across Europe

Autores
Barradas, R; Lencastre, JA; Soares, SP; Valente, A;

Publicação
ROBOTICS

Abstract
The present article explores the impact of educational robotics on fostering computational thinking and problem-solving skills in elementary school students through a problem-based learning approach. This study involved the creation of a framework which includes a robot and two eBooks designed for students and teachers. The eBooks serve as a guide to the construction and programming of a small Arduino-based robot. Through integration with gamification elements, the model features a narrative with three characters to boost a student's engagement and motivation. Through iteration of heuristic evaluations and practical tests, we refined the initial theoretical framework. An empirical study was conducted in two phases involving 350 students. The first empirical test involved a small group of 21 students, similar to end users, from five European schools. With a 100% completion rate for the tasks, 73.47% of these tasks were solved optimally. Later, we conducted a larger validation study which involved 329 students in a Portuguese school. This second phase of the study was conducted during the 2022-2023 and 2023-2024 school years with three study groups. The results led to a 91.13% success rate in problem-solving activities, and 56.99% of those students achieved optimal solutions. Advanced statistical techniques, including ANOVA, were applied to account for group differences and ensure the robustness of the findings. This study demonstrates that the proposed model which integrates educational robotics with problem-based learning effectively promotes computational thinking and problem-solving skills, which are essential for the 21st century. These findings support the inclusion of robotics into primary school curricula and provide a validated framework for educators.

2024

Towards Enhanced Human Activity Recognition for Real-World Human-Robot Collaboration

Autores
Yalcinkaya, B; Couceiro, MS; Pina, L; Soares, S; Valente, A; Remondino, F;

Publicação
2024 IEEE INTERNATIONAL CONFERENCE ON ROBOTICS AND AUTOMATION, ICRA 2024

Abstract
This research contributes to the field of Human-Robot Collaboration (HRC) within dynamic and unstructured environments by extending the previously proposed Fuzzy State-Long Short-Term Memory (FS-LSTM) architecture to handle the uncertainty and irregularity inherent in real-world sensor data. Recognising the challenges posed by low-cost sensors, which are highly susceptible to environmental conditions and often fail to provide regular periodic readings, this paper introduces additional pre-processing blocks. These include two indirect Kalman filters and an additional LSTM network, which together enhance the input variables for the fuzzification process. The enhanced FS-LSTM approach is evaluated using real-world data, demonstrating its effectiveness in extracting meaningful information and accurately recognising human activities. This work underscores the potential of robotics in addressing global challenges, particularly in labour-intensive and hazardous tasks. By improving the integration of humans and robots in unstructured environments, this research contributes to the broader exploration of robotics in new societal applications, fostering connections and collaborations across diverse fields.

2024

Optimizing wind farm cable layout considering ditch sharing

Autores
Cerveira, A; de Sousa, A; Pires, EJS; Baptista, J;

Publicação
INTERNATIONAL TRANSACTIONS IN OPERATIONAL RESEARCH

Abstract
Wind power is becoming an important source of electrical energy production. In an onshore wind farm (WF), the electrical energy is collected at a substation from different wind turbines through electrical cables deployed over ground ditches. This work considers the WF layout design assuming that the substation location and all wind turbine locations are given, and a set of electrical cable types is available. The WF layout problem, taking into account its lifetime and technical constraints, involves selecting the cables to interconnect all wind turbines to the substation and the supporting ditches to minimize the initial investment cost plus the cost of the electrical energy that is lost on the cables over the lifetime of the WF. It is assumed that each ditch can deploy multiple cables, turning this problem into a more complex variant of previously addressed WF layout problems. This variant turns the problem best fitting to the real case and leads to substantial gains in the total cost of the solutions. The problem is defined as an integer linear programming model, which is then strengthened with different sets of valid inequalities. The models are tested with four WFs with up to 115 wind turbines. The computational experiments show that the optimal solutions can be computed with the proposed models for almost all cases. The largest WF was not solved to optimality, but the final relative gaps are small.

  • 24
  • 356