The Design and Deployment of an End-To-End IoT Infrastructure for the Natural Environment

被引:11
|
作者
Nundloll, Vatsala [1 ]
Porter, Barry [1 ]
Blair, Gordon S. [1 ]
Emmett, Bridget [2 ]
Cosby, Jack [2 ]
Jones, Davey L. [3 ,4 ]
Chadwick, Dave [3 ]
Winterbourn, Ben [2 ]
Beattie, Philip [1 ]
Dean, Graham [1 ]
Shaw, Rory [3 ]
Shelley, Wayne [5 ]
Brown, Mike [6 ]
Ullah, Izhar [1 ]
机构
[1] Univ Lancaster, Sch Comp & Commun, Lancaster LA1 4YW, England
[2] Environm Ctr Wales, Ctr Ecol & Hydrol, Bangor LL57 2UW, Gwynedd, Wales
[3] Bangor Univ, Sch Nat Sci, Deiniol Rd, Bangor LL57 2UW, Gwynedd, Wales
[4] Univ Western Australia, UWA Sch Agr & Environm, Crawley, WA 6009, Australia
[5] British Geol Survey, Nottingham NG12 5GG, England
[6] Lancaster Environm Ctr, Ctr Ecol & Hydrol, Lancaster LA1 4AP, England
基金
英国工程与自然科学研究理事会;
关键词
wireless sensor networks; Internet of Things; environmental science; experiences; SENSOR NETWORK;
D O I
10.3390/fi11060129
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Internet of Things (IoT) systems have seen recent growth in popularity for city and home environments. We report on the design, deployment, and use of the IoT infrastructure for environmental monitoring and management. Working closely with hydrologists, soil scientists, and animal behaviour scientists, we successfully deployed and utilised a system to deliver integrated information across these two fields in the first such example of real-time multidimensional environmental science. We describe the design of this system; its requirements and operational effectiveness for hydrological, soil, and ethological scientists; and our experiences from building, maintaining, and using the deployment at a remote site in difficult conditions. Based on this experience, we discuss key future work for the IoT community when working in these kinds of environmental deployments.
引用
收藏
页数:27
相关论文
共 50 条
  • [1] TOWARD END-TO-END BIOMETRICS-BASED SECURITY FOR IOT INFRASTRUCTURE
    Hossain, M. Shamim
    Muhammad, Ghulam
    Rahman, Sk Md Mizanur
    Abdul, Wadood
    Alelaiwi, Abdulhameed
    Alamri, Atif
    [J]. IEEE WIRELESS COMMUNICATIONS, 2016, 23 (05) : 44 - 51
  • [2] End-to-End Security for the IoT
    Dooley, James
    [J]. INTELLIGENT ENVIRONMENTS 2016, 2016, 21 : 606 - 606
  • [3] Niflheim: An End-to-End Middleware for Applications on a Multi-Tier IoT Infrastructure
    Small, Nicolas
    Akkermans, Sven
    Joosen, Wouter
    Hughes, Danny
    [J]. 2017 IEEE 16TH INTERNATIONAL SYMPOSIUM ON NETWORK COMPUTING AND APPLICATIONS (NCA), 2017, : 209 - 216
  • [4] Tunneling techniques for end-to-end VPNs: Generic deployment in an optical testbed environment
    Saad, T
    Alawieh, B
    Mouftah, HT
    Gulder, S
    [J]. IEEE COMMUNICATIONS MAGAZINE, 2006, 44 (05) : 124 - 132
  • [5] Tunneling Techniques for End-to-End VPNs: Generic Deployment in an Optical Testbed Environment
    Saad, Tarek
    Alawieh, Basel
    Gulder, Semra
    Mouftah, Hussein T.
    [J]. 2ND INTERNATIONAL CONFERENCE ON BROADBAND NETWORKS (BROADNETS 2005), 2005, : 924 - 930
  • [6] A secure end-to-end IoT solution
    Mathur, Avijit
    Newe, Thomas
    Elgenaidi, Walid
    Rao, Muzaffar
    Dooly, Gerard
    Toal, Daniel
    [J]. SENSORS AND ACTUATORS A-PHYSICAL, 2017, 263 : 291 - 299
  • [7] End-to-End Management of IoT Applications
    Khazaei, Hamzeh
    Bannazadeh, Hadi
    Leon-Garcia, Alberto
    [J]. 2017 IEEE CONFERENCE ON NETWORK SOFTWARIZATION (IEEE NETSOFT), 2017,
  • [8] Gandalf: An Intelligent, End-To-End Analytics Service for Safe Deployment in Cloud-Scale Infrastructure
    Li, Ze
    Cheng, Qian
    Hsieh, Ken
    Dang, Yingnong
    Huang, Peng
    Singh, Pankaj
    Yang, Xinsheng
    Lin, Qingwei
    Wu, Youjiang
    Levy, Sebastien
    Chintalapati, Murali
    [J]. PROCEEDINGS OF THE 17TH USENIX SYMPOSIUM ON NETWORKED SYSTEMS DESIGN AND IMPLEMENTATION, 2020, : 389 - 402
  • [9] Robot Deployment with End-to-End Communication Constraints
    Le Ny, Jerome
    Ribeiro, Alejandro
    Pappas, George J.
    [J]. 2011 50TH IEEE CONFERENCE ON DECISION AND CONTROL AND EUROPEAN CONTROL CONFERENCE (CDC-ECC), 2011, : 4232 - 4238
  • [10] IoT ETEI: End-to-end IoT device identification method
    Yin, Feihong
    Yang, Li
    Wang, Yuchen
    Dai, Jiahao
    [J]. 2021 IEEE CONFERENCE ON DEPENDABLE AND SECURE COMPUTING (DSC), 2021,