Journal articles on the topic 'Internet Transmission devices'

To see the other types of publications on this topic, follow the link: Internet Transmission devices.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Internet Transmission devices.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Dang, Chinh Manh, Vinh Quang Thai, Minh Ngoc Pham, Trung Thanh Dang, Mai Thanh Thi Phung, and Tan Duy Ngo. "The solution of data transmission security for Gateway IoT." Journal of Mining and Earth Sciences 61, no. 2 (April 29, 2020): 58–67. http://dx.doi.org/10.46326/jmes.2020.61(2).07.

Full text
Abstract:
We are living in the trend of the Internet of Things (IoT), electronic devices that are capable of connecting and exchanging information with each other via the Internet. For automation, monitoring and control systems, there is a need to upgrade existing systems so that users can remotely monitor via the Internet. The solution is to integrate the Gateway device to transmit and receive data. However, in the Internet environment, the issue of information security and safety always needs attention because of the risk of network attacks and data theft. In this paper, the authors present data security solutions for Gateway IoT devices to ensure information security against eavesdropping or sniffers. The device has been integrated into a landslide monitoring system, which has proven to work, increasing the reliability of the system.
APA, Harvard, Vancouver, ISO, and other styles
2

Wu, Tin-Yu, Ren-Hung Hwang, Abhishek Vyas, Chia-Yiu Lin, and Chi-Ruei Huang. "Persistent Periodic Uplink Scheduling Algorithm for Massive NB-IoT Devices." Sensors 22, no. 8 (April 8, 2022): 2875. http://dx.doi.org/10.3390/s22082875.

Full text
Abstract:
Narrowband Internet of Things (NB-IoT) is one of the low-power wide-area network (LPWAN) technologies that aim to support enormous connections, featuring wide-area coverage, low power consumption, and low costs. NB-IoT could serve a massive number of IoT devices, but with very limited radio resources. Therefore, how to enable a massive number of IoT devices to transmit messages periodically, and with low latency, according to transmission requirements, has become the most crucial issue of NB-IoT. Moreover, IoT devices are designed to minimize power consumption so that the device battery can last for a long time. Similarly, the NB-IoT system must configure different power-saving mechanisms for different types of devices to prolong their battery lives. In this study, we propose a persistent periodic uplink scheduling algorithm (PPUSA) to assist a plethora of Internet of Things (IoT) devices in reporting their sensing data based on their sensing characteristics. PPUSA explicitly considers the power-saving mode and connection suspend/resume procedures to reduce the IoT device’s power consumption and processing overhead. PPUSA allocates uplink resource units to IoT devices systematically so that it can support the periodic–uplink transmission of a plethora of IoT devices while maintaining low transmission latency for bursty data. The simulation results show that PPUSA can support up to 600,000 IoT devices when the NB-IoT uplink utilization is 80%. In addition, it takes only one millisecond for the transmission of the bursty messages.
APA, Harvard, Vancouver, ISO, and other styles
3

Kim, Yumi, Mincheol Paik, Bokyeong Kim, Haneul Ko, and Seung-Yeon Kim. "Neighbor-Aware Non-Orthogonal Multiple Access Scheme for Energy Harvesting Internet of Things." Sensors 22, no. 2 (January 7, 2022): 448. http://dx.doi.org/10.3390/s22020448.

Full text
Abstract:
In a non-orthogonal multiple access (NOMA) environment, an Internet of Things (IoT) device achieves a high data rate by increasing its transmission power. However, excessively high transmission power can cause an energy outage of an IoT device and have a detrimental effect on the signal-to-interference-plus-noise ratio of neighbor IoT devices. In this paper, we propose a neighbor-aware NOMA scheme (NA-NOMA) where each IoT device determines whether to transmit data to the base station and the transmission power at each time epoch in a distributed manner with the consideration of its energy level and other devices’ transmission powers. To maximize the aggregated data rate of IoT devices while keeping an acceptable average energy outage probability, a constrained stochastic game model is formulated, and the solution of the model is obtained using a best response dynamics-based algorithm. Evaluation results show that NA-NOMA can increase the average data rate up to 22% compared with a probability-based scheme while providing a sufficiently low energy outage probability (e.g., 0.05).
APA, Harvard, Vancouver, ISO, and other styles
4

Geng, Jiang Tao, and Xiao Bo Xiong. "Research on Mobile Information Access Based on Internet of Things." Applied Mechanics and Materials 539 (July 2014): 460–63. http://dx.doi.org/10.4028/www.scientific.net/amm.539.460.

Full text
Abstract:
The paper design mobile information collection system based on Internet of Things, implemented access gateway by smart mobile devices through a variety of ways, such as Wi-Fi and access the underlying perceptual information based on ZigBee wireless sensor networks. On the one hand, For information sensitivity of the sensor network, we design the mobile terminal through the gateway access authentication protocol, and effective solute the authentication and information between mobile devices and gateways, gateway and sensor network nodes obtain permission problem; on the other hand, according to the practical application of mobile information collection characteristics, the paper proposed information collection strategy based on historical data movement path to solve the problem for too long the device connection is established when the mobile smart devices collecting information along fixed lines, increasing the actual data transmission time and improve the efficiency of information transmission.
APA, Harvard, Vancouver, ISO, and other styles
5

Kanehisa, Rodrigo, Felipe Barbosa, and Alberico De Castro. "5G energy efficiency for Internet of Things." Academic Journal on Computing, Engineering and Applied Mathematics 1, no. 2 (June 10, 2020): 14–23. http://dx.doi.org/10.20873/uft.2675-3588.2020.v1n2.p14-23.

Full text
Abstract:
The Internet of Things (IoT) consists of devices capable of measuring the environment and executing tasks without human intervention. Due to its size, these devices have restrictions in processing, memory, and battery. These devices can reach a trillion nodes and, therefore, requires network connections that are capable of both handle a large number of nodes connected and low energy transmission. The fifth generation of telecommunications technology (5G) is a key concept to address those requirements as new applications and business models require new criteria such as security trustworthy, ultra-low latency, ultra-reliability, and energy efficiency. Although the next generation of connections is at its early stage, progress has been made to achieve 5G enabled IoT technologies. This paper describes a review of the main technologies such as Cloud, Software Defined Network, device-to-device communication, Evolved Package Core and Network Virtual Function Orchestration that are planned to be applied for both fields of 5G and IoT.
APA, Harvard, Vancouver, ISO, and other styles
6

Wang, Chen, Jian Shen, Qi Liu, Yongjun Ren, and Tong Li. "A Novel Security Scheme Based on Instant Encrypted Transmission for Internet of Things." Security and Communication Networks 2018 (2018): 1–7. http://dx.doi.org/10.1155/2018/3680851.

Full text
Abstract:
Internet of Things (IoT) is a research field that has been continuously developed and innovated in recent years and is also an important driving force for the improvement of people’s life in the future. There are lots of scenarios in IoT where we need to collaborate through devices to complete tasks; that is, a device sends data to other devices, and other devices operate on the aid of the data. These transmitted data are often users’ privacy data, such as medical data and grid data. We propose an instant encrypted transmission based security scheme for such scenarios in IoT. The analysis in this paper indicates that our scheme can guarantee the security of users’ data while ensuring rapid transmission and acquisition of instant IoT data.
APA, Harvard, Vancouver, ISO, and other styles
7

Dang, Chi Van, Khoat Duc Nguyen, Luc The Nguyen, Dung Ngoc Le, Quan Hong Luu, and Son Thanh Huynh. "Applying AES algorithm for secure data transmission between Sensor node and LoRa Gateway to Web Server." Journal of Mining and Earth Sciences 63, no. 1 (February 28, 2022): 105–14. http://dx.doi.org/10.46326/jmes.2022.63(1).10.

Full text
Abstract:
Lora Gateway is an intermediary device that can connect devices in the IoT system. IoT is the Internet of Things, consisting of a system of interrelated digital and mechanical devices and machines, capable of transmitting data over a network without requiring human-computer interaction. Lora is a long distance wireless communication technology that enables communication over a wide range between devices. Through this device, the Sensor nodes in the IoT system can transmit and receive data by LoRa waves to the Gateway and by Wifi/3G to the web server via the Internet. Data communicates in the internet environment, so important information needs to be protected by data encryption. This paper presents research and application of 128-bit AES symmetric encryption algorithm in LoRa wide area sensor network to secure data transmission between IoT devices and web server through LoRa Gateway device. The research team has designed and built models for testing sensor stations with integrated humidity and temperature sensors, LoRa Gateway integrating Lora module and wifi/3G module, developing the interface on web server with decoding, monitoring, and data storage features, and proposing a solution with AES encryption algorithm and architecture applied in the development of embedded software for LoRa module. The research results are tested on the model to test the encryption, data transmission, and decryption functions in applications for IoT LoRa Gateway systems. With this initial research, it is possible to apply the AES algorithm to secure data transmission in IoT Gateway systems.
APA, Harvard, Vancouver, ISO, and other styles
8

Burczyk, Robert, Agnieszka Czapiewska, Malgorzata Gajewska, and Slawomir Gajewski. "LTE and NB-IoT Performance Estimation Based on Indicators Measured by the Radio Module." Electronics 11, no. 18 (September 13, 2022): 2892. http://dx.doi.org/10.3390/electronics11182892.

Full text
Abstract:
Monitoring the operating parameters of power grids is extremely important for their proper functioning as well as for ensuring the security of the entire infrastructure. As the idea of the Internet of Things becomes more ubiquitous, there are tools for monitoring the state of the complex electrical grid and means to control it. There are also developed new measuring devices and transmission technologies allowing for the transfer of performed measurements from many places to the network management center. However, there are still no devices that act as data concentrators, which would integrate many transmission technologies and protocols in one device, supporting the communication between those different transmission technologies and which would realize edge computing to assist the management center by prioritizing and combining transmitted data. In this article, the authors present a device that meets the above-mentioned requirements. There are presented research results leading to the development of a decision algorithm, called Multilink—ML, dedicated to the presented device. This algorithm enables the selection between LTE and NB-IoT interfaces for packet transmission without the need to burden the communication system with additional transmissions.
APA, Harvard, Vancouver, ISO, and other styles
9

Vishnyakov, V. A. "Device models and technologies of data transmission and processing in the internet of things networks." «System analysis and applied information science», no. 2 (June 27, 2022): 34–39. http://dx.doi.org/10.21122/2309-4923-2022-2-34-39.

Full text
Abstract:
The subject of research is the analysis and definition of the information model of devices, the choice of technologies and protocols for data collection and analysis, routing protocols for the Internet of Things (IoT) networks. The purpose of the article is to create an information model of IoT devices, to define technologies and protocols for data transmission and processing and routing in Internet of Things systems. Building an information model of an IoT device includes identifying data sources and their formats, creating a model and data structure, and analyzing them using tools such as: Eclipse Vorto ThingBoard, Ubodots IoT, Node-Red-UI, freeboard.io . An example of a description of a model of microclimate control devices using the Eclipse Vorto toolkit is given. Two main data processing technologies from IoT devices are considered: IBM Watson IoT, Cisco IWF with examples of their application. Radio frequency, infrared, optical and galvanic technologies for interaction between data collection and data transmission devices in IoT networks with examples of their use are discussed. The areas of application of three main IoT network protocols are considered: MQTT (large corporate networks), CoAP (limited networks on the Internet), Bluetooth Low Energy (local networks without the Internet with a small amount of data).Wi-Fi WebSockets, ZigBee, LoRA, Simple RF, XMPP, RFID, NFC can be used as additional protocols for networks. The features of using routing protocols in IoT networks are discussed: RPL (low power consumption), cognitive RPL (for intelligent networks), CARP (for underwater communication networks), E-CARP (for data reuse).
APA, Harvard, Vancouver, ISO, and other styles
10

MIAO, Siwei, Xiaojuan ZHANG, and Zhe LIU. "Fine-Grained Access Control Mechanism of Energy Internet." Wuhan University Journal of Natural Sciences 27, no. 3 (June 2022): 231–39. http://dx.doi.org/10.1051/wujns/2022273231.

Full text
Abstract:
The Energy Internet has generated huge amounts of information on the production devices, transmission devices, and energy consumption devices. The leakage of data in the collection, transmission, and storage process will cause serious security problems. The existing Energy Internet security methods rely on traditional access control mechanisms and specific network boundary defense mechanisms, which has the limitations of static strategies and coarse design. We combine the advantages of role-based access control (RBAC) and attribute-based access control (ABAC), and propose a trusted Energy Internet fine-grained access control model based on devices' attribute and users' roles. We have not only achieved fine-grained Energy Internet resource allocation, but also ensured that the access control process is related to the security status of the environment in real time. Experimental results show that the access control model can safely and accurately execute access decisions in the Energy Internet scenario, and the processing performance is more stable.
APA, Harvard, Vancouver, ISO, and other styles
11

Cao, Yue, Zaixin Liu, and Longyu Wu. "Bluetooth Low Energy Error Correction Based on Convolutional Coding." Journal of Physics: Conference Series 2093, no. 1 (November 1, 2021): 012033. http://dx.doi.org/10.1088/1742-6596/2093/1/012033.

Full text
Abstract:
Abstract Contemporarily, the Internet of Things (IoT) is recently a newly emerging technology for connecting small devices into a platform; the IoT has been an increasingly demanded front-edge technology in terms of connecting different devices using information transmission and storage technology. To adapt to the small capacities of device batteries, Bluetooth Low Energy is adopted as the protocol of communication. However, the existing standards do not have a suitable and specific error correction method. As there is no ideal information transmission channel, there must be errors that occurred during message transmission. The performance and capacity of error correction become decisive factors in evaluating how efficient the IoT communication system performs. This article uses convolutional coding—a better-performing coding scheme than block coding—to correct errors in information transmission and reception on Internet of Things devices. It is better competent to control and correct bit errors in information transmission. To achieve this goal, convolutional coding algorithms devised by Dr Justin Coon at the University of Oxford have been referred to. By simulation using MATLAB, it has been found that the error rate is enhanced significantly for high Signal-to-Noise Ratio (SNR) in convolutional codes compared to uncoded messages.
APA, Harvard, Vancouver, ISO, and other styles
12

Hou, Gaopan, Jianfeng Ma, Jiayi Li, and Chen Liang. "Audit Outsourced Data in Internet of Things." Security and Communication Networks 2021 (May 8, 2021): 1–11. http://dx.doi.org/10.1155/2021/6662135.

Full text
Abstract:
With the increase in network transmission rates, the Internet of Things (IoT) has gradually become a trend. Users can upload the data generated by the device to the cloud database to save local storage space, thereby reducing local storage costs. Because uploading data to the cloud loses physical control of the data, an audit is required. Traditional audit protocols are not completely suitable for lightweight devices in the IoT. This paper proposes a new type of audit protocol suitable for lightweight devices with weak computing power. This protocol transfers part of the computation of data tags to a cloud storage provider (CSP) with strong computing power, thereby reducing the introduction of computing entities. Our scheme supports the dynamic operation of data and guarantees the effectiveness of challenge response by blockchain. Compared with existing schemes, our scheme is more secure and effective.
APA, Harvard, Vancouver, ISO, and other styles
13

Jaivignesh, R., R. D. Janarthanan, and V. Gnanalakshmi. "Smart Home Automation using Augmented Reality and Internet of Things." Journal of Physics: Conference Series 2325, no. 1 (August 1, 2022): 012003. http://dx.doi.org/10.1088/1742-6596/2325/1/012003.

Full text
Abstract:
Abstract This paper demonstrates the concept of Augmented Reality and the Internet of Things controlling home appliances through the internet. Nowadays, Home Automation using IoT became an integral part but it can be extended to Augmented Reality. Augmented Reality is used to superimpose interactive content into real-world objects. It helps in placing the 3D objects that help in controlling different IoT devices. The main objective of this paper is to demonstrate and analyse the control of home appliances using augmented reality with the internet of things by a Wi-Fi-based microcontroller. This paper also demonstrates its approach toward multiple devices and proves that augmented reality and IoT are complementary to each other that visual interactive objects can control IoT devices. Performance measures like transmission time, RSSI were taken which plays a major role in terms of Internet of Things. The Transmission time determines the time taken by the Wi-Fi of Esp32 to connect to the blynk server. The Comparative analysis for the Transmission ON time and Transmission OFF time at different ranges is measured. The Transmission ON time is of maximum of 2.36 seconds at a distance of 5m and of 2.65 seconds at a distance of 10m without any hindrance. The Transmission time with a wall hindrance is increases than without the wall hindrance. The Transmission ON time is of 2.9 seconds and the Transmission OFF time is of 2.8 seconds. The Received Signal Strength Indicator indicates the strength of the wifi network is also measured and it indicates the network is good. The Measured value is between -23 dbm to -25 dbm which indicates a better network performance.
APA, Harvard, Vancouver, ISO, and other styles
14

Papp, Istvan, Roman Pavlovic, and Marija Antic. "WISE: MQTT-based Protocol for IP Device Provisioning and Abstraction in IoT Solutions." Elektronika ir Elektrotechnika 27, no. 2 (April 29, 2021): 86–95. http://dx.doi.org/10.5755/j02.eie.28826.

Full text
Abstract:
Although numerous consumer devices use Transmission Control Protocol/Internet Protocol (TCP/IP) protocol stack to connect and communicate over the Internet, their integration into a single Internet of Things (IoT) solution represents a challenge, primarily due to the lack of the standardized interoperability framework on the application layer. Devices produced by different manufacturers cannot operate together out of the box, thus raising the cost of system setup and maintenance. In this paper, a novel protocol is proposed that aims to bridge this gap. It is based on Message Queuing Telemetry Transport (MQTT) protocol and allows the seamless integration of different kinds of IP devices into the connected system. The proposed protocol is complete as it covers the aspects of device discovery and association in the IoT network. It provides mechanisms for IoT network maintenance and defines the abstract device model and communication patterns to enable system-wide device interoperability. The other goal of the protocol is to be portable to resource-constrained platforms. To validate the proposed protocol, it was integrated into the existing smart home hub, and for testing and validation purposes, prototype devices were developed.
APA, Harvard, Vancouver, ISO, and other styles
15

Yazid, Yassine, Antonio Guerrero-González, Imad Ez-Zazi, Ahmed El Oualkadi, and Mounir Arioua. "A Reinforcement Learning Based Transmission Parameter Selection and Energy Management for Long Range Internet of Things." Sensors 22, no. 15 (July 28, 2022): 5662. http://dx.doi.org/10.3390/s22155662.

Full text
Abstract:
Internet of Things (IoT) landscape to cover long-range applications. The LoRa-enabled IoT devices adopt an Adaptive Data Rate-based (ADR) mechanism to assign transmission parameters such as spreading factors, transmission energy, and coding rates. Nevertheless, the energy assessment of these combinations should be considered carefully to select an accurate combination. Accordingly, the computational and transmission energy consumption trade-off should be assessed to guarantee the effectiveness of the physical parameter tuning. This paper provides comprehensive details of LoRa transceiver functioning mechanisms and provides a mathematical model for energy consumption estimation of the end devices EDs. Indeed, in order to select the optimal transmission parameters. We have modeled the LoRa energy optimization and transmission parameter selection problem as a Markov Decision Process (MDP). The dynamic system surveys the environment stats (the residual energy and channel state) and searches for the optimal actions to minimize the long-term average cost at each time slot. The proposed method has been evaluated under different scenarios and then compared to LoRaWAN default ADR in terms of energy efficiency and reliability. The numerical results have shown that our method outperforms the LoRa standard ADR mechanism since it permits the EDs to gain more energy. Besides, it enables the EDs to stand more, consequently performing more transmissions.
APA, Harvard, Vancouver, ISO, and other styles
16

Chen, Mingzhe, Nir Shlezinger, H. Vincent Poor, Yonina C. Eldar, and Shuguang Cui. "Communication-efficient federated learning." Proceedings of the National Academy of Sciences 118, no. 17 (April 22, 2021): e2024789118. http://dx.doi.org/10.1073/pnas.2024789118.

Full text
Abstract:
Federated learning (FL) enables edge devices, such as Internet of Things devices (e.g., sensors), servers, and institutions (e.g., hospitals), to collaboratively train a machine learning (ML) model without sharing their private data. FL requires devices to exchange their ML parameters iteratively, and thus the time it requires to jointly learn a reliable model depends not only on the number of training steps but also on the ML parameter transmission time per step. In practice, FL parameter transmissions are often carried out by a multitude of participating devices over resource-limited communication networks, for example, wireless networks with limited bandwidth and power. Therefore, the repeated FL parameter transmission from edge devices induces a notable delay, which can be larger than the ML model training time by orders of magnitude. Hence, communication delay constitutes a major bottleneck in FL. Here, a communication-efficient FL framework is proposed to jointly improve the FL convergence time and the training loss. In this framework, a probabilistic device selection scheme is designed such that the devices that can significantly improve the convergence speed and training loss have higher probabilities of being selected for ML model transmission. To further reduce the FL convergence time, a quantization method is proposed to reduce the volume of the model parameters exchanged among devices, and an efficient wireless resource allocation scheme is developed. Simulation results show that the proposed FL framework can improve the identification accuracy and convergence time by up to 3.6% and 87% compared to standard FL.
APA, Harvard, Vancouver, ISO, and other styles
17

Mikhnenko, Yaroslav, Mariia Skulysh, Vasil Kurdecha, and Galyna Mikhnenko. "METHOD OF TRANSMITTING INFORMATION ON THE INTERNET OF THINGS." Information and Telecommunication Sciences, no. 1 (June 29, 2021): 41–47. http://dx.doi.org/10.20535/2411-2976.12021.41-47.

Full text
Abstract:
Background. The IoT technology covers devices and appliances, such as thermostats, home security systems and cameras, lighting fixtures as well as other household appliances that support one or more shared ecosystems, and can be controlled by devices associated with that ecosystem, for example with smartphones and smart speakers. However, there are a lot of problems to be solved. One of these problems is the power supply of wireless sensors on the Internet of Things. Objective. The purpose of the study is to reduce energy consumption of IoT devices in the process of transmitting the collected data by regulating the number of transmission transactions. Methods. The analysis of the existing energy saving methods in IoT devices shows that the problem of choosing the optimal buffer size has not yet been solved. An optimization problem has been formulated, which allows considering the requirements for the quality of transmission of both information flows and communication systems that provide this transfer. Results. The article presents the modified method of information transmission to improve the energy efficiency of the network. The need to allocate a queue buffer at each of the nodes and explain the operation of the node using the queue buffer has been highlighted. The scheme of the project with the use of the modified Sleep / Wake algorithm has been created. Conclusions. The main idea of the method is to allocate a buffer at each node with a certain threshold value, and if the latter is exceeded, the transmission of information packets will begin. This increases the service life of WSN by 14.8… 20.6% compared to the IoT sensor networks that use an asynchronous queue cycle. Keywords: IoT; energy efficiency; life expectancy of the IoT network.
APA, Harvard, Vancouver, ISO, and other styles
18

Wu, Xiaofeng, Fangyuan Ren, Yiming Li, Zhenwei Chen, and Xiaoling Tao. "Efficient Authentication for Internet of Things Devices in Information Management Systems." Wireless Communications and Mobile Computing 2021 (July 17, 2021): 1–14. http://dx.doi.org/10.1155/2021/9921036.

Full text
Abstract:
With the rapid development of the Internet of Things (IoT) technology, it has been widely used in various fields. IoT device as an information collection unit can be built into an information management system with an information processing and storage unit composed of multiple servers. However, a large amount of sensitive data contained in IoT devices is transmitted in the system under the actual wireless network environment will cause a series of security issues and will become inefficient in the scenario where a large number of devices are concurrently accessed. If each device is individually authenticated, the authentication overhead is huge, and the network burden is excessive. Aiming at these problems, we propose a protocol that is efficient authentication for Internet of Things devices in information management systems. In the proposed scheme, aggregated certificateless signcryption is used to complete mutual authentication and encrypted transmission of data, and a cloud server is introduced to ensure service continuity and stability. This scheme is suitable for scenarios where large-scale IoT terminal devices are simultaneously connected to the information management system. It not only reduces the authentication overhead but also ensures the user privacy and data integrity. Through the experimental results and security analysis, it is indicated that the proposed scheme is suitable for information management systems.
APA, Harvard, Vancouver, ISO, and other styles
19

Gera, Anju, and Dr. Vaibhav Vyas. "Securing Data using Audio Steganography for the Internet of Things." EAI Endorsed Transactions on Smart Cities 6, no. 4 (January 4, 2023): e5. http://dx.doi.org/10.4108/eetsc.v6i4.1775.

Full text
Abstract:
The Internet of Things (IoT) is prevalent in today's world and is part of our everyday life. While the residential district gains in several respects, numerous problems are developed, such as data confidentiality and privacy. The community is worried, in reality, about what information might leak through IoT. Therefore, the need for a protected environment is necessary if data transmission from devices across the network is to be protected. As a consequence, this paper proposes a secure scheme for using audio steganography to secure data from Laptop, which is distributed as an IoT device to other devices, or on LAN or WAN networks, as an alternative protection strategy along with a home server. The outcome of the developed system shows that the amount of distortion exposed by the Signal to Noise Ratio (SNR) is low.
APA, Harvard, Vancouver, ISO, and other styles
20

Chowdhury, Rajarshi Roy, Azam Che Idris, and Pg Emeroylariffion Abas. "Device identification using optimized digital footprints." IAES International Journal of Artificial Intelligence (IJ-AI) 12, no. 1 (March 1, 2023): 232. http://dx.doi.org/10.11591/ijai.v12.i1.pp232-240.

Full text
Abstract:
<span lang="EN-US">The rapidly increasing number of internet of things (IoT) and non-IoT devices has imposed new security challenges to network administrators. Accurate device identification in the increasingly complex network structures is necessary. In this paper, a device fingerprinting (DFP) method has been proposed for device identification, based on digital footprints, which devices use for communication over a network. A subset of nine features have been selected from the network and transport layers of a single transmission control protocol/internet protocol packet based on attribute evaluators in Weka, to generate device-specific signatures. The method has been evaluated on two online datasets, and an experimental dataset, using different supervised machine learning (ML) algorithms. Results have shown that the method is able to distinguish device type with up to 100% precision using the random forest (RF) classifier, and classify individual devices with up to 95.7% precision. These results demonstrate the applicability of the proposed DFP method for device identification, in order to provide a more secure and robust network.</span>
APA, Harvard, Vancouver, ISO, and other styles
21

Wu, Yong, Bei Gong, and Yu Zhang. "An Improved Efficient Certificateless Hybrid Signcryption Scheme for Internet of Things." Wireless Communications and Mobile Computing 2022 (April 19, 2022): 1–11. http://dx.doi.org/10.1155/2022/6945004.

Full text
Abstract:
The Internet of Things (IoT) is a vast perceptual network formed by a variety of IoT devices connected to each other. In IoT, various devices cooperate with each other to collect and transmit private data of IoT and sustain the efficient and orderly operation of IoT. However, in the complex security situation of IoT, due to the resources of IoT devices being limited, it is difficult for IoT devices to afford the heavy resource consumption of sophisticated data encryption and decryption mechanism, which brings certain security risk to data transmission of IoT. To ensure safe and efficient data transmission, we propose an improved efficient certificateless hybrid signcryption scheme for IoT, which satisfies confidentiality, unforgeability, forward security, public verification, and known session-specific temporary information security; meanwhile, we prove them in random oracle model (ROM). In addition, through simulation experiment, we find that our scheme has higher communication efficiency and computational efficiency compared with existing schemes.
APA, Harvard, Vancouver, ISO, and other styles
22

Zhang, Wenzhan, Yanhui Zhang, Chong Guo, Qi An, Yuming Guo, Ximing Liu, Shijun Zhang, and Junjia Huang. "Certificateless Hybrid Signcryption by a Novel Protocol Applied to Internet of Things." Computational Intelligence and Neuroscience 2022 (February 26, 2022): 1–7. http://dx.doi.org/10.1155/2022/3687332.

Full text
Abstract:
The rapid development of the Internet of Things (IoT) has accelerated the integration of science and technology with life, enabling the public to start enjoying the convenience brought by intelligent living. However, there are multiple resource-constrained sensing devices in IoT, which are always facing various external or internal attacks, making it difficult to ensure the secure transmission of sensitive data in IoT. Therefore, to address the problem of data transmission in resource-constrained devices in IoT, we propose a new certificateless hybrid signcryption scheme for IoT. It is a novel scheme that satisfies confidentiality and unforgeability, showing higher computational efficiency and lower overhead of transmission. To prove that it satisfies the efficent transmission of IoT, we conduct simulation experiments, and the experimental results show that our proposed scheme has higher efficiency than the existing schemes.
APA, Harvard, Vancouver, ISO, and other styles
23

J G, Krithick, Nivedh T S, Siva Bharath S, Dr Radhamani A. S, and V. Ramanathan. "DATA SECURITY IN HEALTHCARE USING IOT." International Journal of Engineering Applied Sciences and Technology 7, no. 3 (July 1, 2022): 79–82. http://dx.doi.org/10.33564/ijeast.2022.v07i03.011.

Full text
Abstract:
While the Internet of Things (IoT) has been instrumental in healthcare data transmission, it also presents vulnerabilities and security risks to patients’ personalized health information for remote medical treatment. Currently most published security solutions available for healthcare data don't seem to be focused on data flow all the way from IoT sensor devices placed on a patient’s body through network routers to doctor’s offices. In this project, the IoT network facilitates healthcare data transmission for remote medical treatment, explored security risks related to unsecured data transmission, especially between IoT sensor devices and network routers, then proposed an encrypted security solution initiated at IoT sensor devices. Our proposed solution provides a cryptography algorithm embedded into the sensor device such that packets generated with patient’s health data are encrypted right at the sensor device before being transmitted. The proof of concept has been verified employing a lab setup with two level encryption at the IoT sensor level and two level decryption at the receiving end at the doctor’s office. Test results are promising for an end to-end security solution of healthcare data transmission in IoT. This project also provides further research avenues on IoT sensor driven security.
APA, Harvard, Vancouver, ISO, and other styles
24

Rosmiati, Mia, Mochammad Fachru Rizal, and Irma Wanti. "Monitoring Location Prototype Using Lora Module." MATEC Web of Conferences 218 (2018): 03007. http://dx.doi.org/10.1051/matecconf/201821803007.

Full text
Abstract:
The number of child abduction cases in Indonesia today is always increasing every year, this has given concern to parents in leaving their children to play outside the home. Therefore, a device that can detect the presence of children when outside the home was needded. At this time, some devices can monitor ones location easily and quickly, such as Smartwatch and GPS Tracker, but the device must be connected to the internet With these conditions, it needs a device that can transmit information in real time without any dependence LoRa module are using low frequency radio as data transmission medium, can be built a Location monitoring prototype without connecting to internet network. From the examination results, the built system successfully shows the real time location coordinate point with a maximum data transmission limit of 2 KM for Line Of Sight (LOS).
APA, Harvard, Vancouver, ISO, and other styles
25

Hou, Wenjun, Song Li, Yanjing Sun, Jiasi Zhou, Xiao Yun, and Nannan Lu. "Interference-Aware Subcarrier Allocation for Massive Machine-Type Communication in 5G-Enabled Internet of Things." Sensors 19, no. 20 (October 18, 2019): 4530. http://dx.doi.org/10.3390/s19204530.

Full text
Abstract:
Massive machine-type communication (mMTC) is investigated as one of three typical scenes of the 5th-generation (5G) network. In this paper, we propose a 5G-enabled internet of things (IoT) in which some enhanced mobile broadband devices transmit video stream to a centralized controller and some mMTC devices exchange short packet data with adjacent devices via D2D communication to promote inter-device cooperation. Since massive MTC devices have data transmission requirements in 5G-enabled IoT with limited spectrum resources, the subcarrier allocation problem is investigated to maximize the connectivity of mMTC devices subject to the quality of service (QoS) requirement of enhanced Mobile Broadband (eMBB) devices and mMTC devices. To solve the formulated mixed-integer non-linear programming (MINLP) problem, which is NP-hard, an interference-aware subcarrier allocation algorithm for mMTC communication (IASA) is developed to maximize the number of active mMTC devices. Finally, the performance of the proposed algorithm is evaluated by simulation. Numerical results demonstrate that the proposed algorithm outperforms the three traditional benchmark methods, which significantly improves the utilization of the uplink spectrum. This indicates that the proposed IASA algorithm provides a better solution for IoT application.
APA, Harvard, Vancouver, ISO, and other styles
26

Liu, Gang, Jingyuan Han, Yi Zhou, Tao Liu, and Jian Chen. "QSLT: A Quantum-Based Lightweight Transmission Mechanism against Eavesdropping for IoT Networks." Wireless Communications and Mobile Computing 2022 (September 27, 2022): 1–13. http://dx.doi.org/10.1155/2022/4809210.

Full text
Abstract:
Quantum Key Distribution (QKD) is a promising paradigm for Internet of Things (IoT) networks against eavesdropping attacks. However, classical quantum-based mechanisms are overweight and expensive for resource-constrained IoT devices. That is, the devices need to frequently exchange with the QKD controller via an out-band quantum channel. In this paper, we propose a novel Quantum-based Secure and Lightweight Transmission (QSLT) mechanism to ease the overweight pain for IoT devices against eavesdropping. Particularly, the mechanism predistributes quantum keys into IoT devices with SIM cards. Using one of the keys, QSLT encrypts or decrypts IoT sensitive data. It is noting that an in-band key-selection method is used to negotiate the session key between two different devices. For example, on one IoT device, the in-band method inserts a key-selection field at the end of the encrypted data to indicate the key’s sequence number. After another device receives the data, QSLT extracts the key-selection field and decrypts the data with the selected quantum key stored locally. We implement the proposed mechanism and evaluate its security and transmission performances. Experimental results show that QSLT can transmit IoT data with a lower delay while guaranteeing the security performance. Besides, QSLT also decreases power usage by approximately 58.77% compared with state of the art mechanisms.
APA, Harvard, Vancouver, ISO, and other styles
27

Kunchok, Tenzin, and Prof Kirubanand V. B. "A lightweight hybrid encryption technique to secure IoT data transmission." International Journal of Engineering & Technology 7, no. 2.6 (March 11, 2018): 236. http://dx.doi.org/10.14419/ijet.v7i2.6.10776.

Full text
Abstract:
Internet of Things(IOT) is the rising innovation without bounds is required to associate billions of devices. IoT is the future where many low power resources and constrained devices are connected by means of the internet for communication, compute process and take actions in the communication network. The increased number of communication is relied upon to produce heaps of information and the security of information can be a threat resulting a secure solution for communication is necessitates among heterogenous devices. Focus of the work is to provide confidentiality, authentication and integrity of data in transit between IoT edge devices and back-end systems. This paper proposes a lightweight hybrid encryption system using ECDH key exchange mechanism for generating keys and establishing connection, digital signature for authentication, thereafter AES algorithm for encryption and decryption of user data file. The proposed combination is referred to as “three way secured data encryption mechanism” which interpret all the 3 protection schemes of authentication, info security and verification with the characteristics of lower calculation cost and faster speed makes it robust for hackers to crack the security system, thereby protective data in transmission.
APA, Harvard, Vancouver, ISO, and other styles
28

Chaari, Mohamed Zied, and Somaya Al-Maadeed. "Increase the Efficiency of IoT Devices by Using the Wireless Power Transmission in the Industrial Revolution 4.0." International Journal of Online and Biomedical Engineering (iJOE) 17, no. 07 (July 2, 2021): 172. http://dx.doi.org/10.3991/ijoe.v17i07.24143.

Full text
Abstract:
<p>Today's world is evolving toward creating a smart house where a multitude of Internet Of Things (IoT) devices and sensors are interacting to deliver plenty of useful information. Essential to the implementation of this IoT is the design of energy-efficient solutions aiming toward a low-carbon-emission, namely green, society. Many R\&amp;D studies are working on a long-range distance wireless charging that will send microwave energy to powered IoT devices wherever it is in the room and without cords. Wireless power transmission technology is the diffusion of RF power without using any physical support. The vision of future technology is to make the IoT devices charging and powered wirelessly. The objective of the work scope is to combine the wireless power technology with smart IoT and IIoT devices and reduce the turnoff of devices due to battery depletion. In this research paper, we designed and realized a wireless charging device using the fundamentals of microwave radiation. The proposed electronic device takes all parameters above to deliver sufficient energy to charging any IoT devices wirelessly with a maximum power of 5W.</p>
APA, Harvard, Vancouver, ISO, and other styles
29

Cao, Yuanlong, Mario Collotta, Siyi Xu, Longjun Huang, Xueqiang Tao, and Zhichao Zhou. "Towards Adaptive Multipath Managing: A Lightweight Path Management Mechanism to Aid Multihomed Mobile Computing Devices." Applied Sciences 10, no. 1 (January 4, 2020): 380. http://dx.doi.org/10.3390/app10010380.

Full text
Abstract:
With the large scale deployment of multihomed mobile computing devices in today’s Internet, the Multipath TCP (MPTCP) is being considered as a preferred data transmission technology in the future Internet due to its promising features of bandwidth aggregation and multipath transmission. However, MPTCP is more likely to be vulnerable to the transmission quality differences of multiple paths, which cause a “hot-potato” out-of-order arrival of packets at the receiver side, and in the absence of a related approach to fix this issue, serious application level performance degradations will occur. In this paper, we proposes MPTCP-LM 3 , a Lightweight path Management Mechanism to aid Multihomed MPTCP based mobile computing devices towards efficient multipath data transmission. The goals of MPTCP-LM 3 are: (i) to offer MPTCP a promising path management mechanism, (ii) to reduce out-of-order data reception and protect against receiver buffer blocking, and (iii) to increase the throughput of mobile computing devices in a multihomed wireless environment. Simulations show that MPTCP-LM 3 outperforms the current MPTCP schemes in terms of performance and quality of service.
APA, Harvard, Vancouver, ISO, and other styles
30

Kovvali, Raja Sravan Kumar, and Gopikrishnan Sundaram. "CETS: Enabling Sustainable IoT with Cooperative Energy Transfer Schedule towards 6G Era." Sensors 22, no. 17 (August 31, 2022): 6584. http://dx.doi.org/10.3390/s22176584.

Full text
Abstract:
The large scale of the Internet of Things necessitates using long-lasting physical layer devices for data collection. Deploying large numbers of Wi-Fi-enabled devices is expensive, so the Internet of Everything (IoE) is equipped with multiple communication modules to collect data where Wi-Fi is unavailable. However, because of their extended communication capabilities, IoE devices face energy limitations. As a result, IoE devices must be provided with the necessary energy resources. This paper introduces a novel multi-hop cooperation communication mechanism for Wireless Energy Transfer (WET) in the Wireless Powered-Internet of Everything (WP-IoE). IoE devices are outfitted here with various communication devices such as RF, Bluetooth, and Wi-Fi. This research proposes a two-phase energy transmission schedule to address the energy requirements. For data collection, the first phase provides a distributed tree-based data communication plan. The proposed model’s second phase used the reverse data collection protocol to implement wireless energy transmission. By combining these two phases, an optimized WET framework was created without unmanned aerial vehicles or robots. The experimental findings show that the proposed method in this research increases the average lifetime of the network and has a more significant charge latency and average charge throughput than other models.
APA, Harvard, Vancouver, ISO, and other styles
31

Hwang, Jaehyun, and Joon Yoo. "A Memory-Efficient Transmission Scheme for Multi-Homed Internet-of-Things (IoT) Devices." Sensors 20, no. 5 (March 6, 2020): 1436. http://dx.doi.org/10.3390/s20051436.

Full text
Abstract:
Internet-of-things (IoT) is a wide spreading technique that enables intelligence to the everyday objects, however, IoT devices are limited in computation and memory space due to their small physical sizes. As a result, IoT applications generally connect to the remote cloud that provides high computation and large storage. To enhance this communication, some IoT devices are equipped with multiple networks, e.g., cellular or Wi-Fi, by using Multipath TCP (MPTCP). However, MPTCP requires large buffer memory space compared to the legacy TCP, which is problematic for low-memory IoT devices. This paper proposes a new MPTCP scheme that leverages the multi-homed feature of low-memory IoT devices. Our design utilizes an application-level distributor that transmits packets to each MPTCP socket at each endpoint of the data. This scheme cleverly avoids the buffer blocking problem, while still maintaining the benefits of multi-homing. The main contribution of our paper is three-fold. First, our proposal achieves the benefits of multipath while avoiding buffer blocking due to out-of-order packets. Second, since our scheme utilizes the original MPTCP and modifies only the application level, it can be deployed more easily to the legacy systems. Finally, our experimental results, conducted on a Linux testbed and real-world cellular/Wi-Fi, show that the proposed scheme requires only half or less memory to achieve the performance of MPTCP.
APA, Harvard, Vancouver, ISO, and other styles
32

Adnan, Syed Farid Syed, Mohd Anuar Mat Isa, and Habibah Hashim. "Testbed versus simulation approach on RF communication with AAβ asymmetric encryption scheme on internet of things devices." Indonesian Journal of Electrical Engineering and Computer Science 14, no. 1 (April 1, 2019): 353. http://dx.doi.org/10.11591/ijeecs.v14.i1.pp353-359.

Full text
Abstract:
<p>The revolution of the Internet of Things (IoT) has given a better way of monitoring things including anything that could gather data and share the information over the internet. Most of the connected things are using Device to Device (D2D) connection to make it available on the internet such as client to a broker or client to a server. However, when IoT devices such as embedded devices and sensors that are connected to the internet, it becomes an open path for attackers to acquire the data and data vulnerably will become an issue. Thus, data integrity might become an issue, or the attackers could temper the data and could cause a disastrous domino effect to the interconnected IoT devices. Therefore, the data security collected from the sensors is substantial even though it could be a single character transmitted. However, IoT sensors are low powered devices in term of CPU, storage, memory and batteries. Securing the devices such as integrating the encryption algorithm computations might give overhead to the sensors and draining the batteries even faster than it is predicted. Alternatively, this paper attempts to explore the capabilities of the asymmetric scheme on resource constrained devices for its communications. Thus, this paper presents an RF communication analysis of a low consumption asymmetric encryption, the AA<sub>β</sub> (AA-Beta) especially on encryption section that is likely to be feasible on IoT devices to preserve the data integrity. The design of RF transmission has been considered to suit the RF transceiver capability to prevent data losses and error from occurring. The result shows that 2.35 times of RF transmits runtime increased compared to RF simulation runtime. Meanwhile, at the receiver side, the runtime increases 60% compared to the simulation.</p>
APA, Harvard, Vancouver, ISO, and other styles
33

Lin, Iuon-Chang, Chin-Chen Chang, and Yu-Sung Chang. "Data Security and Preservation Mechanisms for Industrial Control Network Using IOTA." Symmetry 14, no. 2 (January 26, 2022): 237. http://dx.doi.org/10.3390/sym14020237.

Full text
Abstract:
In the Internet of Things (IoT), many devices can communicate with each other directly through the Internet, and there are already good applications in transportation systems, smart meters, and smart home appliances. Wireless sensor networks are used in these Internet of things applications. Playing a vital role, the upload of data requires multiple layers of transmission to reach the cloud. In the industrial control field, many IoT devices upload data to the cloud for storage, but the upload process is easily tampered with, and centralized cloud services also have security concerns. In addition, in the local IoT perception layer among them, the security of sensor identity verification is also very important for message transmission. The main reason why the past blockchain technology could not be widely used in industrial control and other application fields is the cost considerations, because the procedures for running blockchain nodes and uploading transactions are too expensive. Therefore, this paper proposes an IoT architecture based on the IOTA Tangle network to solve the centralization problem of IoT storage in the cloud, and uses the method of MAM (Masked Authenticated Message) to trace the information of WSNs, while achieving data security and data preservation. In the edge devices of WSNs, because of the insufficient memory and computing performance of many devices, it is impossible to perform proof of work calculations. Therefore, this paper uses the logical key hierarchy-based method to manage the sensors, and applies symmetric and asymmetric encryption in blockchain. The identity verification of the device can be effectively achieved, and the operating cost can be effectively reduced.
APA, Harvard, Vancouver, ISO, and other styles
34

Almahjoub, Alhusein, and Dongyu Qiu. "A Grant-Free Random Access Process for Low-End Distribution System Using Deep Neural Network." Applied Sciences 12, no. 14 (July 13, 2022): 7070. http://dx.doi.org/10.3390/app12147070.

Full text
Abstract:
With the rising number of Internet of Things (IoT) devices joining the communication network, data exchange is increased tremendously resulting in network congestion. This paper deals with the optimal transmission of IoT devices to maximize the chances of success in random access procedures. With every machine trying to use the network for the transfer of data, IoT devices pose serious challenges to the already deployed infrastructure network. With a huge number of IoT devices and fixed limited resources, the existing handshaking-based random access process is not effective. To address this research gap, we propose a grant-free procedure while considering orthogonal transmission and devise a strategy to minimize collisions and idle events and maximize success. We use deep neural networks (DNN) that take channel conditions as an input to predict the device’s transmission for a successful maximization. In order to evaluate the performance of our proposed algorithm, we calculated the average delay with respect to channel coefficient and arrival rate in addition to the number of successes against the channel coefficient. Simulation results show that the proposed algorithm performs well and conforms with the claim of a successful maximization.
APA, Harvard, Vancouver, ISO, and other styles
35

Adel, Abidullha, Md Sohel Rana, Nuruzzam Rana, Md Alamin Hosan, and Mohammad Akbar Shapoor. "An improved Whale Optimization Approach for Effective Data Transmission for IoT Communication." European Journal of Electrical Engineering and Computer Science 5, no. 6 (December 16, 2021): 49–57. http://dx.doi.org/10.24018/ejece.2021.5.6.375.

Full text
Abstract:
Internet of Things (IoT) offers interconnection among several wireless communication devices for the provision of device accessibility and in-built capacity. IoT provides device interaction and provision of advantages capability for networking and socialization with consideration of intermediate devices. Through innovation in technology IoT devices convert cyber environments with hyper-connectivity. IoT communication contains several smart devices such as body sensors, smartphones, tags, electronic gadgets, and so on. IoT communication is involved in the provision of heterogeneous connectivity among devices for the provision of interface and connectivity for enhancing service quality. The data sending among IoT devices is affected by several threats that have an impact on the network’s performance. To overcome the limitation related to IoT communication, it is necessary to develop an appropriate technique for enhancing IoT network communication performance. In this research developed a multi-channel routing approach is adopted in IoT communication. The developed approach utilizes a meta-heuristics approach with probability-based characteristics. For the meta-heuristics approach this research utilizes whale optimization technique combined with probability characteristics for improving the IoT communication performance of the network. The proposed approach utilizes initially constructs the IoT communication path for information sharing and gathering. This path information is identified through the objective function of a meta-heuristic approach. Based on the objective function hoping between the devices is minimized through which data are transmitted in the network. Simulation is performed as a unique proposed approach with a coverage area of 100 meters. For identification of the optimal path in the network, WOA identifies the path of communication through probability function. Comparative analysis of research exhibited that WOA provides significant performance with the identification of optimal value at the range of 1.0746e-78. Further, the proposed probability-based WOA approach significantly improves the performance of the IoT network.
APA, Harvard, Vancouver, ISO, and other styles
36

Azrour, Mourade, Jamal Mabrouki, Azidine Guezzaz, and Ambrina Kanwal. "Internet of Things Security: Challenges and Key Issues." Security and Communication Networks 2021 (September 14, 2021): 1–11. http://dx.doi.org/10.1155/2021/5533843.

Full text
Abstract:
Internet of Things (IoT) refers to a vast network that provides an interconnection between various objects and intelligent devices. The three important components of IoT are sensing, processing, and transmission of data. Nowadays, the new IoT technology is used in many different sectors, including the domestic, healthcare, telecommunications, environment, industry, construction, water management, and energy. IoT technology, involving the usage of embedded devices, differs from computers, laptops, and mobile devices. Due to exchanging personal data generated by sensors and the possibility of combining both real and virtual worlds, security is becoming crucial for IoT systems. Furthermore, IoT requires lightweight encryption techniques. Therefore, the goal of this paper is to identify the security challenges and key issues that are likely to arise in the IoT environment in order to guide authentication techniques to achieve a secure IoT service.
APA, Harvard, Vancouver, ISO, and other styles
37

hertanto, Deny Budi, Rustam Asnawi, Faranita Surwi, and Nurman Setiawan. "Prototype Development Of Distance Detection System Based On The Internet Of Things Using Esp 8266 Wifi Nodemcu Module." Journal of Physics: Conference Series 2111, no. 1 (November 1, 2021): 012049. http://dx.doi.org/10.1088/1742-6596/2111/1/012049.

Full text
Abstract:
Abstract In the previous article about detecting train arrivals [4], we discussed the data transmission process which is the weakness of the system. This article discusses how to overcome these shortcomings. Distance detection systems need to be added to devices that are more powerful and faster in transmitting data. The prototype is built based on the development of the previous prototype. The initial product is a distance detector that has a motion sensor and a data transmission module in the form of Lora 400 MHz and a GSM module. Product development includes the addition of the NodeMCU WIFI module to existing devices. System development aims to: (1) Develop a distance detection system equipped with a WIFI module; and (2) Increase the data transmission speed of the distance detection system equipped with the WIFI NodeMCU module. The implementation method uses research and development techniques [3]. System development takes 6 months, with the stages of completion being system requirements analysis, hardware, and software design, system prototyping, and tool testing. Checklist data and delivery time are used as test data. Furthermore, the data is analyzed quantitatively to determine the achievement of results according to predetermined indicators. The device is equipped with a GPS module, a Lora-R02 receiver and transmitter module, and a Nodemcu ESP8266 module as a replacement for the 900A SIM module which transmits data faster. When the device is being tested, all the sensors of the tool work well at range of 125 meters (previously less than 100 meters). While the Lora module can react when the object has reached a distance of 300 meters. Data transmission previously using GSM modules took 10-13 seconds. After using the WIFI module, data transmission only takes 1-3 seconds.
APA, Harvard, Vancouver, ISO, and other styles
38

Putrolaynen, Vadim, Maksim Belyaev, Dmitriy Kirienko, and Pavel Lun'kov. "Modular hardware platform for the development of industrial Internet of Things (IoT) devices." Science intensive technologies in mechanical engineering 2021, no. 12 (December 30, 2021): 20–25. http://dx.doi.org/10.30987/2223-4608-2021-12-20-25.

Full text
Abstract:
The modular hardware platform architecture for the development of industrial IoT devices is presented as an example of information harvesting and its analysis. Variants of modules implementing typical functions of such devices are given: data acquisition from a distributed array of sensors; preprocessing, aggregation and data transmission; data mining; storage of primary data and analysis results.
APA, Harvard, Vancouver, ISO, and other styles
39

Shahryari, Om-Kolsoom, Amjad Anvari-Moghaddam, and Shadi Shahryari. "Demand side management using the internet of energy based on LoRaWAN technology." Kurdistan Journal of Applied Research 2, no. 3 (August 27, 2017): 112–19. http://dx.doi.org/10.24017/science.2017.3.35.

Full text
Abstract:
The smart grid, as a communication network, allows numerous connected devices such as sensors, relays and actuators to interact and cooperate with each other. An Internet-based solution for electricity that provides bidirectional flow of information and power is internet of energy (IoE) which is an extension of smart grid concept. A large number of connected devices and the huge amount of data generated by IoE and issues related to data transmission, process and storage, force IoE to be integrated by cloud computing. Furthermore, in order to enhance the performance and reduce the volume of transmitted data and process information in an acceptable time, fog computing is suggested as a layer between IoE layer and cloud layer. This layer is used as a local processing level that leads to reduction in data transmissions to the cloud. So, it can save energy consumption used by IoE devices to transmit data into cloud because of a long range, low power, wide area and low bit rate wireless telecommunication system which is called LoRaWAN. All devices in fog domain are connected by long range wide area network (LoRa) into a smart gateway. The gateway which bridges fog domain and cloud, is introduced for scheduling devices/appliances by creating a priority queue which can perform demand side management dynamically. The queue is affected by not only the consumer importance but also the consumer policies and the status of energy resources.
APA, Harvard, Vancouver, ISO, and other styles
40

Arrofiq, Muhammad, and Mohammad Rizki Romadhon. "Data Traffic Analysis on an Electric Current Monitoring System." Journal of Internet and Software Engineering 1, no. 1 (December 19, 2020): 6. http://dx.doi.org/10.22146/jise.v1i1.715.

Full text
Abstract:
Change and Innovation continues as the times progress. Especially in the field of technology, one of which is the Internet of Things (IoT). With the existence of this technology, electronic devices can be connected to the internet. This will simplify the process of data transmission and device control. With this aim, the authors do research on the implementation of IoT technology on electronic devices, especially in the field of electricity. Electrical energy monitoring systems are used to detect the use of electrical energy used by the load. In this monitoring system, the measurement of the electric current using the current sensor. The measurement data made by the current sensor will be processed by the microcontroller. The research developed arduino-based monitoring systems and databases aimed at detecting and monitoring the use of electric current. In addition, it also performs analysis of data traffic from arduino devices and databases, to find out data delay, throughput or packet loss by using Wireshark.
APA, Harvard, Vancouver, ISO, and other styles
41

dos Anjos, Julio C. S., João L. G. Gross, Kassiano J. Matteussi, Gabriel V. González, Valderi R. Q. Leithardt, and Claudio F. R. Geyer. "An Algorithm to Minimize Energy Consumption and Elapsed Time for IoT Workloads in a Hybrid Architecture." Sensors 21, no. 9 (April 21, 2021): 2914. http://dx.doi.org/10.3390/s21092914.

Full text
Abstract:
Advances in communication technologies have made the interaction of small devices, such as smartphones, wearables, and sensors, scattered on the Internet, bringing a whole new set of complex applications with ever greater task processing needs. These Internet of things (IoT) devices run on batteries with strict energy restrictions. They tend to offload task processing to remote servers, usually to cloud computing (CC) in datacenters geographically located away from the IoT device. In such a context, this work proposes a dynamic cost model to minimize energy consumption and task processing time for IoT scenarios in mobile edge computing environments. Our approach allows for a detailed cost model, with an algorithm called TEMS that considers energy, time consumed during processing, the cost of data transmission, and energy in idle devices. The task scheduling chooses among cloud or mobile edge computing (MEC) server or local IoT devices to achieve better execution time with lower cost. The simulated environment evaluation saved up to 51.6% energy consumption and improved task completion time up to 86.6%.
APA, Harvard, Vancouver, ISO, and other styles
42

Zhu, Jun, Xiao Jia, and Xiao Qing Mei. "Smart Home Control System Based on Internet of Things." Applied Mechanics and Materials 738-739 (March 2015): 233–37. http://dx.doi.org/10.4028/www.scientific.net/amm.738-739.233.

Full text
Abstract:
A set of smart home control system based on Internet of Things is proposed due to the rapid development of smart home. This paper designs a system platform which people can use to make a remote query and control the home applications. Constrained Application Protocol is utilized in the communication between terminal devices which have limited memory and low calculation efficiency. The system has the characteristics of smart sensor, reliable transmission and intelligent processing. With the devices connected to the Internet, the results show that the system runs steadily so that it can provide the basis for further research of smart home.
APA, Harvard, Vancouver, ISO, and other styles
43

Qi, Huiwen, Yingsheng Peng, and Han Zhang. "Performance analysis for wireless-powered IoT networks with hybrid non-orthogonal multiple access." Journal of Smart Environments and Green Computing 2, no. 3 (2022): 105–25. http://dx.doi.org/10.20517/jsegc.2022.04.

Full text
Abstract:
Aim: In this paper, we study a wireless-powered Internet of Things (IoT) network, where a hybrid access point (HAP) charges IoT devices with wireless energy transfer technology (WET) and collects their data by wireless information transfer (WIT). Methods: To improve spectral efficiency, we propose a hybrid non-orthogonal multiple access (NOMA)-based transmission scheme. On the one hand, NOMA technology is applied for WIT. On the other hand, when some devices transmit data, the HAP can simultaneously charge the other devices, namely concurrent WET and WIT, such that the other devices can harvest more energy to achieve a better rate with some rate loss of these devices due to interference. %During the transmission of some devices, the WET is simultaneously conducted, such that other devices can harvest more energy to achieve a better rate with a rate loss of these devices due to the interference. How to divide devices into the interference and non-interference groups, namely device grouping, and how to pair devices, e.g., device pairing, becomes critical issues in terms of the achieved network throughput and fairness. Results: We first formulate the network throughput maximization problem by optimizing the pairing and grouping policies. To simplify the analysis, we then investigate two specific hybrid NOMA-based transmission schemes. In the former, all devices are firstly paired based on the max-min criterion, where the "best" device is paired with the "worst" one, and then grouped in either ascending or descending order; this is referred to as the first-pairing-then-grouping (FPTG) scheme. In the latter, devices are first grouped and then paired; this is referred to as the first-grouping-then-pairing (FGTP) scheme. By applying the order statistics theory, we theoretically analyze the achieved network throughput and derive the corresponding pairing and grouping policies. Furthermore, we study the max-min fairness of the proposed hybrid NOMA-based scheme. Conclusion: Simulation results validate the significant improvement of the proposed hybrid NOMA-based scheme in terms of network throughput and fairness.
APA, Harvard, Vancouver, ISO, and other styles
44

Pappalardo, Martina, Antonio Virdis, and Enzo Mingozzi. "Energy-Optimized Content Refreshing of Age-of-Information-Aware Edge Caches in IoT Systems." Future Internet 14, no. 7 (June 28, 2022): 197. http://dx.doi.org/10.3390/fi14070197.

Full text
Abstract:
The Internet of Things (IoT) brings internet connectivity to everyday devices. These devices generate a large volume of information that needs to be transmitted to the nodes running the IoT applications, where they are processed and used to make some output decisions. On the one hand, the quality of these decisions is typically affected by the freshness of the received information, thus requesting frequent updates from the IoT devices. On the other hand, the severe energy, memory, processing, and communication constraints of IoT devices and networks pose limitations in the frequency of sensing and reporting. So, it is crucial to minimize the energy consumed by the device for sensing the environment and for transmitting the update messages, while taking into account the requirements for information freshness. Edge-caching can be effective in reducing the sensing and the transmission frequency; however, it requires a proper refreshing scheme to avoid staleness of information, as IoT applications need timeliness of status updates. Recently, the Age of Information (AoI) metric has been introduced: it is the time elapsed since the generation of the last received update, hence it can describe the timeliness of the IoT application’s knowledge of the process sampled by the IoT device. In this work, we propose a model-driven and AoI-aware optimization scheme for information caching at the network edge. To configure the cache parameters, we formulate an optimization problem that minimizes the energy consumption, considering both the sampling frequency and the average frequency of the requests sent to the device for refreshing the cache, while satisfying an AoI requirement expressed by the IoT application. We apply our caching scheme in an emulated IoT network, and we show that it minimizes the energy cost while satisfying the AoI requirement. We also compare the case in which the proposed caching scheme is implemented at the network edge against the case in which there is not a cache at the network edge. We show that the optimized cache can significantly lower the energy cost of devices that have a high transmission cost because it can reduce the number of transmissions. Moreover, the cache makes the system less sensitive to higher application-request rates, as the number of messages forwarded to the devices depends on the cache parameters.
APA, Harvard, Vancouver, ISO, and other styles
45

Fei, Jiaxuan, Qigui Yao, Mingliang Chen, Xiangqun Wang, and Jie Fan. "The Abnormal Detection for Network Traffic of Power IoT Based on Device Portrait." Scientific Programming 2020 (November 24, 2020): 1–9. http://dx.doi.org/10.1155/2020/8872482.

Full text
Abstract:
The construction of power Internet of things is an important development direction for power grid enterprises. Although power Internet of things is a kind of network, it is denser than the ordinary Internet of things points and more complex equipment types, so it has higher requirements for network security protection. At the same time, due to the special information perception and transmission mode in the Internet of things, the information transmitted in the network is easy to be stolen and resold, and traditional security measures can no longer meet the security protection requirements of the new Internet of things devices. To solve the privacy leakage and security attack caused by the illegal intrusion in the network, this paper proposes to construct a device portrait for terminal devices in the power Internet of things and detect abnormal traffic in the network based on device portrait. By collecting traffic data in the network environment, various network traffic characteristics are extracted, and abnormal traffic is analyzed and identified by the machine learning algorithm. By collecting the traffic data in the network environment, the features are extracted from the physical layer, network layer, and application layer of the message, and the device portrait is generated by a machine learning algorithm. According to the established attack mode, the corresponding traffic characteristics are analyzed, and the detection of abnormal traffic is achieved by comparing the attack traffic characteristics with the device portrait. The experimental results show that the accuracy of this method is more than 90%.
APA, Harvard, Vancouver, ISO, and other styles
46

Zhang, Jing, Qi Liu, Lu Chen, Ye Tian, and Jun Wang. "Nonintrusive Load Management Based on Distributed Edge and Secure Key Agreement." Wireless Communications and Mobile Computing 2021 (January 29, 2021): 1–13. http://dx.doi.org/10.1155/2021/6691348.

Full text
Abstract:
With the advancement of national policies and the rise of Internet of things (IoT) technology, smart meters, smart home appliances, and other energy monitoring systems continue to appear, but due to the fixed application scenarios, it is difficult to apply to different equipment monitoring. At the same time, the limited computing resources of sensing devices make it difficult to guarantee the security in the transmission process. In order to help users better understand the energy consumption of different devices in different scenarios, we designed a nonintrusive load management based on distributed edge and secure key agreement, which uses narrowband Internet of things (NB-IoT) for transmission and uses edge devices to forward node data to provide real-time power monitoring for users. At the same time, we measured the changes of server power under different behaviors to prepare for further analysis of the relationship between server operating state and energy consumption.
APA, Harvard, Vancouver, ISO, and other styles
47

Shumeiko, Irina, and Andrey Pasechnik. "The Development of Secure Protocol in Smart Technologies for Schema-based One-time Pads Using the System of Near-field Actions." NBI Technologies, no. 1 (August 2019): 31–35. http://dx.doi.org/10.15688/nbit.jvolsu.2019.1.6.

Full text
Abstract:
Interacting with modern technology using the Internet provides a large number of remote control mechanisms. All of them somehow work with packet data transmission, but differ from each other by algorithms of packet formation, their transmission, as well as encryption methods. Remote access tools are mechanisms for communication both locally and globally (on the Internet). The purpose of this article is to develop a secure Protocol for “smart home” remote control technology. In the course of the study, a method was developed to control the devices of the “Internet of things” using the channel of information transmission in the form of instant messaging system on the Internet. The result of this work is a developed mechanism for secure data exchange between the client and the “smart home” server. This Protocol is a unique solution for protecting information exchange channels in the field of “Internet of things” devices, as well as the whole concept of “smart home”. The implementation of the tasks is fully achieved, and this Protocol can be used in real conditions. The relevance of protecting information in “smart homes” is a fundamental point in developing this technology. Developing this Protocol allows you to bring the information security of homes to a new level. The project can be used in mass use, and the safe mechanism can become an integral part in the homes of the future.
APA, Harvard, Vancouver, ISO, and other styles
48

Zhang, Zhen, Yibing Li, Chao Wang, Meiyu Wang, Ya Tu, and Jin Wang. "An Ensemble Learning Method for Wireless Multimedia Device Identification." Security and Communication Networks 2018 (October 15, 2018): 1–9. http://dx.doi.org/10.1155/2018/5264526.

Full text
Abstract:
In the last decade, wireless multimedia device is widely used in many fields, which leads to efficiency improvement, reliability, security, and economic benefits in our daily life. However, with the rapid development of new technologies, the wireless multimedia data transmission security is confronted with a series of new threats and challenges. In physical layer, Radio Frequency Fingerprinting (RFF) is a unique characteristic of IoT devices themselves, which can difficultly be tampered. The wireless multimedia device identification via Radio Frequency Fingerprinting (RFF) extracted from radio signals is a physical-layer method for data transmission security. Just as people’s unique fingerprinting, different Internet of Things (IoT) devices exhibit different RFF which can be used for identification and authentication. In this paper, a wireless multimedia device identification system based on Ensemble Learning is proposed. The key technologies such as signal detection, RFF extraction, and classification model are discussed. According to the theoretical modeling and experiment validation, the reliability and the differentiability of the RFFs are evaluated and the classification results are shown under the real wireless multimedia device environments.
APA, Harvard, Vancouver, ISO, and other styles
49

Hassan, Najmul, and Noor M. Khan. "Cost-effective reliable transmission service for Internet of Flying Things." International Journal of Distributed Sensor Networks 17, no. 6 (June 2021): 155014772110178. http://dx.doi.org/10.1177/15501477211017820.

Full text
Abstract:
High-speed quality Internet provision for aircraft passengers is thought to be one of the major unresolved challenges for ubiquitous Internet provision. This article aims to resolve the problem of airborne Internet access with high quality of service for modern Internet of things devices. Large remote regions in the ocean along the busy air routes (e.g. Atlantic Ocean) require high-speed, reliable, and low-cost airborne Internet (i.e. Internet provision to the aircraft) to manage various delay- and throughput-sensitive applications. Conventional satellite-based solutions can be an alternate for Internet provision in such far-flung areas; but, such solutions are lacking quality of service (with longer delays and low bandwidth) and are significantly costly. Fortunately, the underwater optical fiber cables deployed across the oceans pass along the same busy air routes. This infrastructure of underwater optical fiber cables can be exploited for Internet backbone providing high quality of service for wireless Internet provision to the commercial aircraft. Dedicated stationary ships deployed along these underwater optical fiber cables can be utilized for Internet provision, navigation, and security to ships and aircraft. This article not only proposes the networking infrastructure of the submarine cable-based airborne Internet access architecture but also presents a novel routing scheme for airborne ad hoc networks. Also, we analyze quality of service provision as compared to other existing techniques. Our simulation results show that our proposed solution outperforms other existing schemes for airborne Internet service provision, in the presence of high mobility and dynamic topology changes.
APA, Harvard, Vancouver, ISO, and other styles
50

Shang, Xiaohui, Aijun Liu, Yida Wang, Qing Xie, and Yong Wang. "Energy-Efficient Transmission Based on Direct Links: Toward Secure Cooperative Internet of Things." Wireless Communications and Mobile Computing 2018 (December 17, 2018): 1–8. http://dx.doi.org/10.1155/2018/5012096.

Full text
Abstract:
In this paper, the secure uplink transmission scenario in Internet of Things (IoT) applications is investigated, where one of multiple sensors communicates with the controller aided by the cooperative relay. Firstly, by considering the direct link, an energy-efficient transmission scheme (EET) is proposed, which can be suitable for the resource-constrained devices and applications in IoT communication. Moreover, the secrecy outage probability (SOP) and secure energy efficiency (SEE) of different transmission strategies are derived, which contributes to the design of energy-efficient secure transmission. Finally, simulation results demonstrate that EET outperforms other transmission protocols in terms of SEE in most situations. To improve the secrecy performance and energy efficiency of the IoT deployment, EET can be adopted as an effective additional strategy in practical applications.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography