Auswahl der wissenschaftlichen Literatur zum Thema „IoT device provisioning“

Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an

Wählen Sie eine Art der Quelle aus:

Machen Sie sich mit den Listen der aktuellen Artikel, Bücher, Dissertationen, Berichten und anderer wissenschaftlichen Quellen zum Thema "IoT device provisioning" bekannt.

Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.

Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.

Zeitschriftenartikel zum Thema "IoT device provisioning"

1

Kwon, Sungmoon, Jaehan Jeong und Taeshik Shon. „Toward Security Enhanced Provisioning in Industrial IoT Systems“. Sensors 18, Nr. 12 (10.12.2018): 4372. http://dx.doi.org/10.3390/s18124372.

Der volle Inhalt der Quelle
Annotation:
Through the active development of industrial internet of things (IIoT) technology, there has been a rapid increase in the number of different industrial wireless sensor networks (IWSNs). Accordingly, the security of IWSNs is also of importance, as many security problems related to IWSN protocols have been raised and various studies have been conducted to solve these problems. However, the provisioning process is the first step in introducing a new device into the IIoT network and a starting point for IIoT security. Therefore, leakage of security information in the provisioning process makes exposure of secret keys and all subsequent security measures meaningless. In addition, using the exploited secret keys, the attacker can send false command to the node or send false data to the network manager and it can cause serious damage to industrial infrastructure depending on the IWSN. Nevertheless, a security study on the provisioning process has not been actively carried out, resulting in a provisioning process without guaranteed security. Therefore, in this paper, we analyzed security issues of the provisioning process in IWSN by researching prominent IWSN standards, including ISA 100.11a, WirelessHART, and Zigbee, and also an ISA 100.11a-certified device and provisioning process-related studies. Then, we verified the security issues of the provisioning process through testing and analyzing the provisioning process using the ISA 100.11a standard-implemented devices and ISA 100.11a-certified devices. Finally, we discuss security considerations and the direction of future research on provisioning security for IWSN in the IIoT era.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Zhao, Shuai, Bo Cheng, Le Yu, Shou-lu Hou, Yang Zhang und Jun-liang Chen. „Internet of Things Service Provisioning Platform for Cross-Application Cooperation“. International Journal of Web Services Research 13, Nr. 1 (Januar 2016): 1–22. http://dx.doi.org/10.4018/ijwsr.2016010101.

Der volle Inhalt der Quelle
Annotation:
With the development of Internet of Things (IoT), large-scale of resources and applications atop them emerge. However, most of existing efforts are “silo” solutions, there is a tight-coupling between the device and the application. The paradigm for IoT and its corresponding infrastructure are required to move away from isolated solutions towards cooperative models. Recent works have focused on applying Service Oriented Architecture (SOA) to IoT service provisioning. Other than the traditional services of cyberspace which are oriented to a two-tuple problem domain, IoT services are faced with a three-tuple problem domain of user requirement, cyberspace and physical space. One challenge of existing works is lacking of efficient mechanism to on-demand provisioning the sensing information in a loosely-coupled, decentralized way and then dynamically coordinate the relevant services to rapidly respond to changes in the physical world. Another challenge is how to systematically and effectively access (plug) the heterogeneous devices without intrusive changing. This paper proposes a service provisioning platform which enables to access heterogeneous devices and expose device capabilities as light-weighted service, and presents an event-based message interaction mode to facilitate the asynchronous, on-demand sharing of sensing information in distributed, loosely-coupled IoT environment. It provides the basic infrastructure for IoT application pattern: inner-domain high-degree autonomy and inter-domain dynamic coordination. The practicability of platform is validated by experimental evaluations and a District Heating Control and Information System (DHCIS).
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Papp, Istvan, Roman Pavlovic und Marija Antic. „WISE: MQTT-based Protocol for IP Device Provisioning and Abstraction in IoT Solutions“. Elektronika ir Elektrotechnika 27, Nr. 2 (29.04.2021): 86–95. http://dx.doi.org/10.5755/j02.eie.28826.

Der volle Inhalt der Quelle
Annotation:
Although numerous consumer devices use Transmission Control Protocol/Internet Protocol (TCP/IP) protocol stack to connect and communicate over the Internet, their integration into a single Internet of Things (IoT) solution represents a challenge, primarily due to the lack of the standardized interoperability framework on the application layer. Devices produced by different manufacturers cannot operate together out of the box, thus raising the cost of system setup and maintenance. In this paper, a novel protocol is proposed that aims to bridge this gap. It is based on Message Queuing Telemetry Transport (MQTT) protocol and allows the seamless integration of different kinds of IP devices into the connected system. The proposed protocol is complete as it covers the aspects of device discovery and association in the IoT network. It provides mechanisms for IoT network maintenance and defines the abstract device model and communication patterns to enable system-wide device interoperability. The other goal of the protocol is to be portable to resource-constrained platforms. To validate the proposed protocol, it was integrated into the existing smart home hub, and for testing and validation purposes, prototype devices were developed.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Sousa, Patrícia, Luís Magalhães, João Resende, Rolando Martins und Luís Antunes. „Provisioning, Authentication and Secure Communications for IoT Devices on FIWARE“. Sensors 21, Nr. 17 (02.09.2021): 5898. http://dx.doi.org/10.3390/s21175898.

Der volle Inhalt der Quelle
Annotation:
The increasing pervasiveness of the Internet of Things is resulting in a steady increase of cyberattacks in all of its facets. One of the most predominant attack vectors is related to its identity management, as it grants the ability to impersonate and circumvent current trust mechanisms. Given that identity is paramount to every security mechanism, such as authentication and access control, any vulnerable identity management mechanism undermines any attempt to build secure systems. While digital certificates are one of the most prevalent ways to establish identity and perform authentication, their provision at scale remains open. This provisioning process is usually an arduous task that encompasses device configuration, including identity and key provisioning. Human configuration errors are often the source of many security and privacy issues, so this task should be semi-autonomous to minimize erroneous configurations during this process. In this paper, we propose an identity management (IdM) and authentication method called YubiAuthIoT. The overall provisioning has an average runtime of 1137.8 ms ±65.11+δ. We integrate this method with the FIWARE platform, as a way to provision and authenticate IoT devices.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Ganesan, Elaiyasuriyan, I.-Shyan Hwang, Andrew Tanny Liem und Mohammad Syuhaimi Ab-Rahman. „SDN-Enabled FiWi-IoT Smart Environment Network Traffic Classification Using Supervised ML Models“. Photonics 8, Nr. 6 (04.06.2021): 201. http://dx.doi.org/10.3390/photonics8060201.

Der volle Inhalt der Quelle
Annotation:
Due to the rapid growth of the Internet of Things (IoT), applications such as the Augmented Reality (AR)/Virtual Reality (VR), higher resolution media stream, automatic vehicle driving, the smart environment and intelligent e-health applications, increasing demands for high data rates, high bandwidth, low latency, and the quality of services are increasing every day (QoS). The management of network resources for IoT service provisioning is a major issue in modern communication. A possible solution to this issue is the use of the integrated fiber-wireless (FiWi) access network. In addition, dynamic and efficient network configurations can be achieved through software-defined networking (SDN), an innovative and programmable networking architecture enabling machine learning (ML) to automate networks. This paper, we propose a machine learning supervised network traffic classification scheduling model in SDN enhanced-FiWi-IoT that can intelligently learn and guarantee traffic based on its QoS requirements (QoS-Mapping). We capture the different IoT and non-IoT device network traffic trace files based on the traffic flow and analyze the traffic traces to extract statistical attributes (port source and destination, IP address, etc.). We develop a robust IoT device classification process module framework, using these network-level attributes to classify IoT and non-IoT devices. We tested the proposed classification process module in 21 IoT/Non-IoT devices with different ML algorithms and the results showed that classification can achieve a Random Forest classifier with 99% accuracy as compared to other techniques.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Yao, Jingjing, und Nirwan Ansari. „QoS-Aware Fog Resource Provisioning and Mobile Device Power Control in IoT Networks“. IEEE Transactions on Network and Service Management 16, Nr. 1 (März 2019): 167–75. http://dx.doi.org/10.1109/tnsm.2018.2888481.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Sierra, Rodrigo, und Hubert Odziemczyk. „Readying CERN for connected device era“. EPJ Web of Conferences 245 (2020): 07015. http://dx.doi.org/10.1051/epjconf/202024507015.

Der volle Inhalt der Quelle
Annotation:
Whether you consider “IoT” as a real thing or a buzzword, there’s no doubt that connected devices, data analysis and automation are transforming industry. CERN is no exception: a network of LoRa-based radiation monitors has recently been deployed and there is a growing interest in the advantages connected devices could bring—to accelerator operations just as much as to building management. Connected devices bring risks as well as advantages, however, and the last thing any business needs is an unsafe, uncoordinated and unmanaged sensor environment. To support the deployment of the LoRa-based radiation sensors, CERN has established both a Low Power Wireless Area Network (LPWAN) to complement the existing wired and wireless networks and a service infrastructure to manage the provisioning, orchestration, data transfer, security and operation for connected devices.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Al Ridhawi, Ismaeel, Moayad Aloqaily und Yaser Jararweh. „An Incentive-based Mechanism for Volunteer Computing Using Blockchain“. ACM Transactions on Internet Technology 21, Nr. 4 (22.07.2021): 1–22. http://dx.doi.org/10.1145/3419104.

Der volle Inhalt der Quelle
Annotation:
The rise of fast communication media both at the core and at the edge has resulted in unprecedented numbers of sophisticated and intelligent wireless IoT devices. Tactile Internet has enabled the interaction between humans and machines within their environment to achieve revolutionized solutions both on the move and in real-time. Many applications such as intelligent autonomous self-driving, smart agriculture and industrial solutions, and self-learning multimedia content filtering and sharing have become attainable through cooperative, distributed, and decentralized systems, namely, volunteer computing. This article introduces a blockchain-enabled resource sharing and service composition solution through volunteer computing. Device resource, computing, and intelligence capabilities are advertised in the environment to be made discoverable and available for sharing with the aid of blockchain technology. Incentives in the form of on-demand service availability are given to resource and service providers to ensure fair and balanced cooperative resource usage. Blockchains are formed whenever a service request is initiated with the aid of fog and mobile edge computing (MEC) devices to ensure secure communication and service delivery for the participants. Using both volunteer computing techniques and tactile internet architectures, we devise a fast and reliable service provisioning framework that relies on a reinforcement learning technique. Simulation results show that the proposed solution can achieve high reward distribution, increased number of blockchain formations, reduced delays, and balanced resource usage among participants, under the premise of high IoT device availability.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Tran, Minh-Quang, Duy Tai Nguyen, Van An Le, Duc Hai Nguyen und Tran Vu Pham. „Task Placement on Fog Computing Made Efficient for IoT Application Provision“. Wireless Communications and Mobile Computing 2019 (10.01.2019): 1–17. http://dx.doi.org/10.1155/2019/6215454.

Der volle Inhalt der Quelle
Annotation:
Fog computing is one of the promising technologies for realizing global-scale Internet of Things (IoT) applications as it allows moving compute and storage resources closer to IoT devices, where data is generated, in order to solve the limitations in cloud-based technologies such as communication delay, network load, energy consumption, and operational cost. However, this technology is still in its infancy stage containing essential research challenges. For instance, what is a suitable fog computing scheme where effective service provision models can be deployed is still an open question. This paper proposes a novel multitier fog computing architecture that supports IoT service provisioning. Concretely, a solid service placement mechanism that optimizes service decentralization on fog landscape leveraging context-aware information such as location, response time, and resource consumption of services has been devised. The proposed approach optimally utilizes virtual resources available on the network edges to improve the performance of IoT services in terms of response time, energy, and cost reduction. The experimental results from both simulated data and use cases from service deployments in real-world applications, namely, the intelligent transportation system (ITS) in Ho Chi Minh City, show the effectiveness of the proposed solution in terms of maximizing fog device utilization while reducing latency, energy consumption, network load, and operational cost. The results confirm the robustness of the proposed scheme revealing its capability to maximize the IoT potential.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Labrado, Carson, Himanshu Thapliyal, Stacy Prowell und Teja Kuruganti. „Use of Thermistor Temperature Sensors for Cyber-Physical System Security“. Sensors 19, Nr. 18 (10.09.2019): 3905. http://dx.doi.org/10.3390/s19183905.

Der volle Inhalt der Quelle
Annotation:
The last few decades have seen a large proliferation in the prevalence of cyber-physical systems. This has been especially highlighted by the explosive growth in the number of Internet of Things (IoT) devices. Unfortunately, the increasing prevalence of these devices has begun to draw the attention of malicious entities which exploit them for their own gain. What makes these devices especially attractive is the various resource constraints present in these devices that make it difficult to add standard security features. Therefore, one intriguing research direction is creating security solutions out of already present components such as sensors. Physically Unclonable Functions (PUFs) are one potential solution that use intrinsic variations of the device manufacturing process for provisioning security. In this work, we propose a novel weak PUF design using thermistor temperature sensors. Our design uses the differences in resistance variation between thermistors in response to temperature change. To generate a PUF that is reliable across a range of temperatures, we use a response-generation algorithm that helps mitigate the effects of temperature variation on the thermistors. We tested the performance of our proposed design across a range of environmental operating conditions. From this we were able to evaluate the reliability of the proposed PUF with respect to variations in temperature and humidity. We also evaluated the PUF’s uniqueness using Monte Carlo simulations.
APA, Harvard, Vancouver, ISO und andere Zitierweisen

Dissertationen zum Thema "IoT device provisioning"

1

Rusiňák, Petr. „Bezpečné zprovoznění IoT zařízení“. Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2021. http://www.nusl.cz/ntk/nusl-445532.

Der volle Inhalt der Quelle
Annotation:
S ohledem na stále rostoucí počty prodaných IoT zařízeních se postupně začínají objevovat projekty, ve kterých jsou IoT zařízení použity ve stovkách až tisících. Tyto projekty však z časových důvodů neumožňují ruční konfiguraci každého zařízení zvlášť, čímž vzniká poptávka po protokolech, které dokáží rychle, ale přitom i bezpečně, nastavit nové IoT zařízení. Cílem této práce je vytvořit protokol, který umožní automatický přenos přihlašovacích údajů k Wi-Fi síti do nově zakoupeného IoT zařízení. Navržený protokol používá speciální konfigurační zařízení, ve kterém budou uloženy přihlašovací údaje všech zařízeních kompatibilních s tímto protokolem v rámci dané administrativní domény, a které bude poskytovat tyto přihlašovací údaje nenakonfigurovaným IoT zařízením za předpokladu, že je možné ověřit jejich identitu. K ověření identity nenakonfigurovaných zařízení je použita asymetrické kryptografie. Protokol byl implementován pomocí IoT zařízeních ESP32, přičemž ke komunikaci mezi nenakonfigurovanými je využit nespojovaný komunikační protokol ESP-NOW.
APA, Harvard, Vancouver, ISO und andere Zitierweisen

Buchteile zum Thema "IoT device provisioning"

1

Jensen, David. „Device Provisioning Service“. In Beginning Azure IoT Edge Computing, 189–203. Berkeley, CA: Apress, 2019. http://dx.doi.org/10.1007/978-1-4842-4536-1_7.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Smith, Drew. „Mass Provisioning of iOS Devices“. In Apple macOS and iOS System Administration, 505–31. Berkeley, CA: Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-5820-0_12.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Kesavan, Selvaraj, Senthilkumar J., Suresh Y. und Mohanraj V. „IoT Device Onboarding, Monitoring, and Management“. In Advances in Web Technologies and Engineering, 227–55. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-3111-2.ch013.

Der volle Inhalt der Quelle
Annotation:
In establishing a healthy environment for connectivity devices, it is essential to ensure that privacy and security of connectivity devices are well protected. The modern world lives on data, information, and connectivity. Various kinds of sensors and edge devices stream large volumes of data to the cloud platform for storing, processing, and deriving insights. An internet of things (IoT) system poses certain difficulties in discretely identifying, remotely configuring, and controlling the devices, and in the safe transmission of data. Mutual authentication of devices and networks is crucial to initiate secure communication. It is important to keep the data in a secure manner during transmission and in store. Remotely operated devices help to monitor, control, and manage the IoT system efficiently. This chapter presents a review of the approaches and methodologies employed for certificate provisioning, device onboarding, monitoring, managing, and configuring of IoT systems. It also examines the real time challenges and limitations in and future scope for IoT systems.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Tanque, Marcus. „Examining of Data Security, Privacy, and Reliability for Cloud and Internet of Things Integration“. In Advances in Wireless Technologies and Telecommunication, 57–90. IGI Global, 2018. http://dx.doi.org/10.4018/978-1-5225-3445-7.ch004.

Der volle Inhalt der Quelle
Annotation:
Converging Cloud computing with Internet of Things transformed organizations' traditional technologies. This chapter examines the intersection of cloud computing and internet of things in consort with how these solutions often interact on the internet. Vendors develop CloudIoT capabilities to support organizations' day-to-day operations. IoT is a combined platform encompassing physical and virtual nodes. IoT objects comprise device-to-device data sharing, machine-to-machine provisioning, sensors, actuators, and processors. These systems may be deployed as hardware components and applications software. This chapter also emphasizes data security, reliability, resource provisioning, service-level agreement, quality of service, IoT, privacy, and device integration. This chapter also highlights operational benefits and/or security issues affecting CC and IoT technologies.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Zhao, Shuai, Bo Cheng, Le Yu, Shou-lu Hou, Yang Zhang und Jun-liang Chen. „Internet of Things Service Provisioning Platform for Cross-Application Cooperation“. In Securing the Internet of Things, 655–78. IGI Global, 2020. http://dx.doi.org/10.4018/978-1-5225-9866-4.ch033.

Der volle Inhalt der Quelle
Annotation:
With the development of Internet of Things (IoT), large-scale of resources and applications atop them emerge. However, most of existing efforts are “silo” solutions, there is a tight-coupling between the device and the application. The paradigm for IoT and its corresponding infrastructure are required to move away from isolated solutions towards cooperative models. Recent works have focused on applying Service Oriented Architecture (SOA) to IoT service provisioning. Other than the traditional services of cyberspace which are oriented to a two-tuple problem domain, IoT services are faced with a three-tuple problem domain of user requirement, cyberspace and physical space. One challenge of existing works is lacking of efficient mechanism to on-demand provisioning the sensing information in a loosely-coupled, decentralized way and then dynamically coordinate the relevant services to rapidly respond to changes in the physical world. Another challenge is how to systematically and effectively access (plug) the heterogeneous devices without intrusive changing. This paper proposes a service provisioning platform which enables to access heterogeneous devices and expose device capabilities as light-weighted service, and presents an event-based message interaction mode to facilitate the asynchronous, on-demand sharing of sensing information in distributed, loosely-coupled IoT environment. It provides the basic infrastructure for IoT application pattern: inner-domain high-degree autonomy and inter-domain dynamic coordination. The practicability of platform is validated by experimental evaluations and a District Heating Control and Information System (DHCIS).
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Mala, D. Jeya. „IoT Functional Testing Using UML Use Case Diagrams“. In Advances in Systems Analysis, Software Engineering, and High Performance Computing, 125–45. IGI Global, 2019. http://dx.doi.org/10.4018/978-1-5225-7790-4.ch006.

Der volle Inhalt der Quelle
Annotation:
In the IoT applications development process, the consumers expectations are always high. Thus, the development environment should be focusing on virtual provisioning, manipulation, and testing and debugging. This has also raised more challenges in terms of proper testing to be done in both user interface level as well as the functionality level. It will be really challenging to test a connected device within a full IoT environment, which will have more devices with varied functionalities and data processing. These challenges have made a new way of testing to be done so that the test cases will be more efficient in revealing the errors in the software. In this chapter, UML use case diagram-based test cases generation for an IoT environment is explained in detail. Also, a real-time case study IoT application is taken to showcase how this approach helps in generating the test cases to test the embedded software in these IoT devices in terms of data flow, control flow, and functionalities with improved performance.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Babu, R., K. Jayashree und R. Abirami. „Fog Computing Qos Review and Open Challenges“. In Research Anthology on Architectures, Frameworks, and Integration Strategies for Distributed and Cloud Computing, 1147–57. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-5339-8.ch054.

Der volle Inhalt der Quelle
Annotation:
Internet of Things (IoT) enables inters connectivity among devices and platforms. IoT devices such as sensors, or embedded systems offer computational, storage, and networking resources and the existence of these resources permits to move the execution of IoT applications to the edge of the network and it is known as fog computing. It is able to handle billions of Internet-connected devices and is well situated for real-time big data analytics and provides advantages in advertising and personal computing. The main issues in fog computing includes fog networking, QoS, interfacing and programming model, computation offloading, accounting, billing and monitoring, provisioning and resource management, security and privacy. A particular research challenge is the Quality of Service metric for fog services. Thus, this paper gives a survey of cloud computing, discusses the QoS metrics, and the future research directions in fog computing.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Condoluci, Massimo, Maria A. Lema, Toktam Mahmoodi und Mischa Dohler. „5G IoT Industry Verticals and Network Requirements“. In Powering the Internet of Things With 5G Networks, 148–75. IGI Global, 2018. http://dx.doi.org/10.4018/978-1-5225-2799-2.ch006.

Der volle Inhalt der Quelle
Annotation:
The effective provisioning of industry verticals over the next-to-come 5G systems opens novel business opportunities for telco operators especially when considering the integration of Internet of Things (IoT) devices as enablers of business cases based on remote sensing and control. This chapter highlights the main features of IoT verticals with particular attention on healthcare, smart cities, industry automation and entertainment business cases. The aim of this Chapter is to derive the requirements such IoT verticals pose in terms of design features to be considered in the standardization of 5G systems. This chapter presents the state of the art on the contribution from the research community and standardization bodies to address the 5G design characteristics with particular attention to the features enabling a proper management of IoT-oriented business cases.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Condoluci, Massimo, Maria A. Lema, Toktam Mahmoodi und Mischa Dohler. „5G IoT Industry Verticals and Network Requirements“. In Research Anthology on Developing and Optimizing 5G Networks and the Impact on Society, 928–49. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-7708-0.ch039.

Der volle Inhalt der Quelle
Annotation:
The effective provisioning of industry verticals over the next-to-come 5G systems opens novel business opportunities for telco operators especially when considering the integration of Internet of Things (IoT) devices as enablers of business cases based on remote sensing and control. This chapter highlights the main features of IoT verticals with particular attention on healthcare, smart cities, industry automation and entertainment business cases. The aim of this Chapter is to derive the requirements such IoT verticals pose in terms of design features to be considered in the standardization of 5G systems. This chapter presents the state of the art on the contribution from the research community and standardization bodies to address the 5G design characteristics with particular attention to the features enabling a proper management of IoT-oriented business cases.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Manukumar, Shanthi Thangam, und Vijayalakshmi Muthuswamy. „A Novel Resource Management Framework for Fog Computing by Using Machine Learning Algorithm“. In Advances in Computer and Electrical Engineering, 42–52. IGI Global, 2020. http://dx.doi.org/10.4018/978-1-7998-0194-8.ch002.

Der volle Inhalt der Quelle
Annotation:
With the development of edge devices and mobile devices, the authenticated fast access for the networks is necessary and important. To make the edge and mobile devices smart, fast, and for the better quality of service (QoS), fog computing is an efficient way. Fog computing is providing the way for resource provisioning, service providers, high response time, and the best solution for mobile network traffic. In this chapter, the proposed method is for handling the fog resource management using efficient offloading mechanism. Offloading is done based on machine learning prediction technology and also by using the KNN algorithm to identify the nearest fog nodes to offload. The proposed method minimizes the energy consumption, latency and improves the QoS for edge devices, IoT devices, and mobile devices.
APA, Harvard, Vancouver, ISO und andere Zitierweisen

Konferenzberichte zum Thema "IoT device provisioning"

1

Wang, Dong, Sooyong Lee, Yongsheng Zhu und Yuguang Li. „A zero human-intervention provisioning for industrial IoT devices“. In 2017 IEEE International Conference on Industrial Technology (ICIT). IEEE, 2017. http://dx.doi.org/10.1109/icit.2017.7915546.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Hassebo, A., S. Chaudhary, M. A. Saleh und M. A. Ali. „Dynamic Provisioning of Emerging Multifunction/Multi-Bearer Smart IoT Devices“. In 2020 International Conference on Innovative Trends in Communication and Computer Engineering (ITCE). IEEE, 2020. http://dx.doi.org/10.1109/itce48509.2020.9047814.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Yao, Jun, Zhizhong Zhang, Peiliang Dong und Rong Fan. „Flexible secret protection method for the provisioning of IoT devices“. In 2017 IEEE 9th International Conference on Communication Software and Networks (ICCSN). IEEE, 2017. http://dx.doi.org/10.1109/iccsn.2017.8230089.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Ali, Omer, Mohamad Khairi Ishak, Lunchakorn Wuttisittikulkij und Tay Zar Bhone Maung. „IoT Devices and Edge gateway provisioning, realtime analytics for simulated and virtually emulated devices“. In 2020 International Conference on Electronics, Information, and Communication (ICEIC). IEEE, 2020. http://dx.doi.org/10.1109/iceic49074.2020.9051037.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Chen, Wei-Han, und Fuchun Joseph Lin. „Over-the-Air Provisioning for IoT Wearable Devices via BLE and oneM2M“. In 2019 IEEE 43rd Annual Computer Software and Applications Conference (COMPSAC). IEEE, 2019. http://dx.doi.org/10.1109/compsac.2019.10174.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Boskov, Ivan, Halil Yetgin, Matevz Vucnik, Carolina Fortuna und Mihael Mohorcic. „Time-to-Provision Evaluation of IoT Devices Using Automated Zero-Touch Provisioning“. In GLOBECOM 2020 - 2020 IEEE Global Communications Conference. IEEE, 2020. http://dx.doi.org/10.1109/globecom42002.2020.9348119.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Awodele, Oludele, Victor Dibia, Oghenerukevwe Onoruvie und Sharon Okoruwa. „Services Provisioning on Mobile Devices via Bluetooth in a Localized Setting Using a Proposed System - BTServ“. In InSITE 2008: Informing Science + IT Education Conference. Informing Science Institute, 2008. http://dx.doi.org/10.28945/3272.

Der volle Inhalt der Quelle
Annotation:
Conventionally, enterprise services that can be utilized by mobile devices such as E - mail, instant messaging, data transfer, news and event notification have been typically achieved using GPRS (General Packet Radio Service) connections to access internet servers that provide these services. Thus, even in a local area, disadvantages such as full dependence on GPRS service providers, incurred GPRS costs and slow data/communication rates constitute formidable drawbacks. This paper describes a system /Architecture (BTServ) in which these same services can be supplied via Bluetooth, with notable benefits such as high data rates, minimal dependence on external (GPRS) networks, higher security (internet attacks are totally avoided) and reduced cost, in a localized setting such as a corporate house.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Wir bieten Rabatte auf alle Premium-Pläne für Autoren, deren Werke in thematische Literatursammlungen aufgenommen wurden. Kontaktieren Sie uns, um einen einzigartigen Promo-Code zu erhalten!

Zur Bibliographie