To see the other types of publications on this topic, follow the link: IoT availability.

Journal articles on the topic 'IoT availability'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'IoT availability.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Nguyen, Tuan Anh, Dugki Min, and Eunmi Choi. "A Hierarchical Modeling and Analysis Framework for Availability and Security Quantification of IoT Infrastructures." Electronics 9, no. 1 (January 14, 2020): 155. http://dx.doi.org/10.3390/electronics9010155.

Full text
Abstract:
Modeling a complete Internet of Things (IoT) infrastructure is crucial to assess its availability and security characteristics. However, modern IoT infrastructures often consist of a complex and heterogeneous architecture and thus taking into account both architecture and operative details of the IoT infrastructure in a monolithic model is a challenge for system practitioners and developers. In that regard, we propose a hierarchical modeling framework for the availability and security quantification of IoT infrastructures in this paper. The modeling methodology is based on a hierarchical model of three levels including (i) reliability block diagram (RBD) at the top level to capture the overall architecture of the IoT infrastructure, (ii) fault tree (FT) at the middle level to elaborate system architectures of the member systems in the IoT infrastructure, and (iii) continuous time Markov chain (CTMC) at the bottom level to capture detailed operative states and transitions of the bottom subsystems in the IoT infrastructure. We consider a specific case-study of IoT smart factory infrastructure to demonstrate the feasibility of the modeling framework. The IoT smart factory infrastructure is composed of integrated cloud, fog, and edge computing paradigms. A complete hierarchical model of RBD, FT, and CTMC is developed. A variety of availability and security measures are computed and analyzed. The investigation of the case-study’s analysis results shows that more frequent failures in cloud cause more severe decreases of overall availability, while faster recovery of edge enhances the availability of the IoT smart factory infrastructure. On the other hand, the analysis results of the case-study also reveal that cloud servers’ virtual machine monitor (VMM) and virtual machine (VM), and fog server’s operating system (OS) are the most vulnerable components to cyber-security attack intensity. The proposed modeling and analysis framework coupled with further investigation on the analysis results in this study help develop and operate the IoT infrastructure in order to gain the highest values of availability and security measures and to provide development guidelines in decision-making processes in practice.
APA, Harvard, Vancouver, ISO, and other styles
2

Sun, Bin, Renkang Geng, Yuan Xu, and Tao Shen. "Prediction of Emergency Mobility Under Diverse IoT Availability." EAI Endorsed Transactions on Pervasive Health and Technology 8, no. 4 (September 13, 2022): e2. http://dx.doi.org/10.4108/eetpht.v8i4.274.

Full text
Abstract:
INTRODUCTION: Prediction of emergency mobility needs to consider more scenarios as Internet of Things (IoT) develops at a high speed, which influences the quality and quantity of data, manageable resources and algorithms. OBJECTIVES: This work investigates differences in dynamic emergency mobility prediction when facing dynamic temporal IoT data with different quality and quantity considering diverse computing resources and algorithm availability. METHODS: A node construction scheme under a small range of traffic networks is adopted in this work, which can effectively convert the road to graph network structure data which has been proved to be feasible and used for the small-scale traffic network data here. Besides, two different datasets are formed using public large scale traffic network data. Representative widely used and proven algorithms from typical types of methods are selected respectively with different datasets to conduct experiments. RESULTS: The experimental results show that the graphed data and neural network algorithm can deal with the dynamic time series data with complex nodes and edges in a better way, while the non-neural network algorithm can predict the with a simple graph network structure. CONCLUSION: Our proposed graph construction with graph neural network improves dynamic emergency mobility prediction. The prediction should consider the scenarios of availability of computing resources, quantity and quality of data among other IoT features to improve the results. Later, automation and data enrichment should be improved.
APA, Harvard, Vancouver, ISO, and other styles
3

Ateya, Abdelhamied A., Abeer D. Algarni, Monia Hamdi, Andrey Koucheryavy, and Naglaa F. Soliman. "Enabling Heterogeneous IoT Networks over 5G Networks with Ultra-Dense Deployment—Using MEC/SDN." Electronics 10, no. 8 (April 11, 2021): 910. http://dx.doi.org/10.3390/electronics10080910.

Full text
Abstract:
The Internet of things (IoT) is the third evolution of the traditional Internet that enables interaction and communication among machines. Many IoT platforms and networks have been developed, and recently, market sectors have started to develop specific IoT applications and services. Integrating heterogeneous IoT networks with the existing ones, mainly with the cellular networks, is a great demand. IoT represents one of the main use cases of the fifth-generation (5G) cellular system as announced by the 3rd Generation Partnership Project (3GPP) and the International Telecommunication Union (ITU). Integrating IoT networks with 5G networks face many challenges related to dense deployment and a massive number of expected connected devices. Thus, IoT network availability and scalability are the main requirements that should be achieved. To this end, this work provides a framework for integrating heterogeneous IoT networks with the 5G networks. The proposed system considers dense deployment and system scalability and availability requirements as announced by ITU and 3GPP. Our proposed structure deploys three main communication paradigms; mobile edge computing (MEC), device-to-device communications (D2D), and software-defined networking (SDN). Our proposed system is evaluated over a reliable environment for various deployment scenarios, and the results validate the proposed structure. The proposed IoT/5G reduces the percentage of blocked tasks by an average of 30% than other traditional IoT networks. This increases the overall system availability and scalability since IoT networks can have more devices and tasks than existing IoT networks. Furthermore, our proposed structure reduces the overall consumed energy by an average of 20% than existing IoT networks, which is an effective metric for IoT networks.
APA, Harvard, Vancouver, ISO, and other styles
4

Tang, Shensheng, and Yi Xie. "Availability Modeling and Performance Improving of a Healthcare Internet of Things (IoT) System." IoT 2, no. 2 (May 14, 2021): 310–25. http://dx.doi.org/10.3390/iot2020016.

Full text
Abstract:
Internet of Things (IoT) is improving human life in a more convenient and simpler way. One of the most promising IoT applications is healthcare. In this paper, an availability model of a healthcare IoT system is proposed which is composed of two groups of structures described by separate Markov state-space models. The two separate models are analyzed and combined to implement the whole IoT system modeling. The system balance equations are solved under a given scenario and some performance metrics of interest, such as probabilities of full service, degraded service, and the system unavailability, are derived. Detailed numerical evaluation of selected metrics is provided for further understanding and verification of the analytic results. An availability performance improving (API) method is also proposed for increasing the probability of system full service and decreasing the system unavailability. The proposed system modeling and performance improving method can serve as a useful reference for general IoT system design and evaluation.
APA, Harvard, Vancouver, ISO, and other styles
5

Dr. Ramkrishna Manatkar, Surabhi Hatagale,. "Fleet maintenance using IOT technology." Psychology and Education Journal 57, no. 9 (January 5, 2021): 6251–53. http://dx.doi.org/10.17762/pae.v57i9.2717.

Full text
Abstract:
In fleet management, fleet maintenance is an important exposure to increase availability. Periodic and preventive maintenance is one such crucial aspect which is considered regardless of the practical faults which in sets of the need for repair and replacement cost as well time attached with it. With development in technology IOT and big data have been in talks. With all the data that is being produced predictive maintenance can be performed using this technology. IOT based predictive maintenance can increase fleet availability, stability and efficiency, reduced cost through effective maintenance planning and eliminate unnecessary maintenance tasks.
APA, Harvard, Vancouver, ISO, and other styles
6

Turkmanović, Haris, Ivan Popović, Zoran Čiča, and Dejan Drajić. "Simulation environment for scalability and performance analysis in hierarchically organized IoT systems." Telfor Journal 14, no. 2 (2022): 85–90. http://dx.doi.org/10.5937/telfor2202085t.

Full text
Abstract:
The accelerated development of technologies, especially in the field of telecommunications, ease the integration of embedded devices within various IoT applications. Modern IoT applications assume heterogenous embedded platforms capable of collecting, processing, and exchanging data between the tiers of the IoT system architecture. Designing a multi-tier IoT system, even in the case of architecture that involves a small number of intelligent embedded devices, can be a very demanding process, especially when dealing with the strict requirements of IoT application concerning application performance, scalability, and energy consumption. In this paper, an open-source simulation framework for the performance analysis of an arbitrary multi-tiered IoT system is presented. Framework supports insight into the data availability within the tiers of IoT system enabling designers to evaluate the performance of IoT application and to engineer the system operation and deployment. Besides the performance analysis, proposed framework enables the analysis of energy consumption, architecture scalability utilizing different communication patterns and technologies. The case study of a large-scale IoT application for demonstrating the framework potential regarding the scalability and data availability analysis is also given.
APA, Harvard, Vancouver, ISO, and other styles
7

Gor, Parthavi, Taslim Divan, Himani Sharma, Divya Makwana, and D. K. Jhala. "IoT Operating Systems: Perspective, Availability and Proposed New Architecture." Indian Journal of Computer Science 4, no. 5 (October 31, 2019): 18. http://dx.doi.org/10.17010/ijcs/2019/v4/i5/149456.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Rahmani, Amir Masoud, Rizwan Ali Naqvi, Saqib Ali, Seyedeh Yasaman Hosseini Mirmahaleh, and Mehdi Hosseinzadeh. "Quasi-Mapping and Satisfying IoT Availability with a Penalty-Based Algorithm." Mathematics 9, no. 24 (December 17, 2021): 3286. http://dx.doi.org/10.3390/math9243286.

Full text
Abstract:
The Internet of things and medical things (IoT) and (IoMT) technologies have been deployed to simplify humanity’s life, which the complexity of communications between their layers was increased by rising joining the applications to IoT and IoMT-based infrastructures. The issue is challenging for decision-making and the quality of service where some researchers addressed the reward-based methods to tackle the problems by employing reinforcement learning (RL) algorithms and deep neural networks (DNNs). Nevertheless, satisfying its availability remains a challenge for the quality of service due to the lack of imposing a penalty to the defective devices after detecting faults. This paper proposes a quasi-mapping method to transfer the roles of sensors and services onto a neural network’s nodes to satisfy IoT-based applications’ availability using a penalty-backwarding approach into the NN’s weights and prunes weak neurons and synaptic weights (SWs). We reward the sensors and fog services, and the connection weights between them when are covered the defective nodes’ output. Additionally, this work provides a decision-making approach to dedicate the suitable service to the requester using employing a threshold value in the NN’s output layer according to the application. By providing an intelligent algorithm, the study decides to provide a service based on its availability and updating initial information, including faulty devices and new joined components. The observations and results prove decision-making accuracy for different IoT-based applications by approximately 95.8–97% without imposing the cost. The study reduces energy consumption and delay by approximately 64.71% and 47.4% compared without using neural networks besides creating service availability. This idea affects deploying IoT infrastructures to decision-making about providing appropriate services in critical situations because of removing defective devices and joining new components by imposing penalties and rewards by the designer, respectively.
APA, Harvard, Vancouver, ISO, and other styles
9

Yang, Hyunsik, and Younghan Kim. "Design and Implementation of High-Availability Architecture for IoT-Cloud Services." Sensors 19, no. 15 (July 25, 2019): 3276. http://dx.doi.org/10.3390/s19153276.

Full text
Abstract:
For many vertical Internet of Things (IoT) applications, the high availability is very important. In traditional cloud systems, services are usually implemented with the same level of availability in which the fault detection and fault recovery mechanisms are not aware of service characteristics. In IoT-cloud, various services are provided with different service characteristics and availability requirements. Therefore, the existing cloud system is inefficient to optimize the availability method and resources to meet service requirements. To address this issue, this paper proposes a high availability architecture that is capable of dynamically optimizing the availability method based on service characteristics. The proposed architecture was verified through an implementation system based on OpenStack, and it was demonstrated that the system was able to achieve the target availability while optimizing resources, in contrast with existing architectures that use predefined availability methods.
APA, Harvard, Vancouver, ISO, and other styles
10

Martinez Alonso, Rodney, David Plets, Ernesto Fontes Pupo, Margot Deruyck, Luc Martens, Glauco Guillen Nieto, and Wout Joseph. "IoT-Based Management Platform for Real-Time Spectrum and Energy Optimization of Broadcasting Networks." Wireless Communications and Mobile Computing 2018 (July 11, 2018): 1–14. http://dx.doi.org/10.1155/2018/7287641.

Full text
Abstract:
We investigate the feasibility of Internet of Things (IoT) technology to monitor and improve the energy efficiency and spectrum usage efficiency of broadcasting networks in the Ultra-High Frequency (UHF) band. Traditional broadcasting networks are designed with a fixed radiated power to guarantee a certain service availability. However, excessive fading margins often lead to inefficient spectrum usage, higher interference, and power consumption. We present an IoT-based management platform capable of dynamically adjusting the broadcasting network radiated power according to the current propagation conditions. We assess the performance and benchmark two IoT solutions (i.e., LoRa and NB-IoT). By means of the IoT management platform the broadcasting network with adaptive radiated power reduces the power consumption by 15% to 16.3% and increases the spectrum usage efficiency by 32% to 35% (depending on the IoT platform). The IoT feedback loop power consumption represents less than 2% of the system power consumption. In addition, white space spectrum availability for secondary wireless telecommunications services is increased by 34% during 90% of the time.
APA, Harvard, Vancouver, ISO, and other styles
11

Botez, Robert, Jose Costa-Requena, Iustin-Alexandru Ivanciu, Vlad Strautiu, and Virgil Dobrota. "SDN-Based Network Slicing Mechanism for a Scalable 4G/5G Core Network: A Kubernetes Approach." Sensors 21, no. 11 (May 29, 2021): 3773. http://dx.doi.org/10.3390/s21113773.

Full text
Abstract:
Managing the large volumes of IoT and M2M traffic requires the evaluation of the scalability and reliability for all the components in the end-to-end system. This includes connectivity, mobile network functions, and application or services receiving and processing the data from end devices. Firstly, this paper discusses the design of a containerized IoT and M2M application and the mechanisms for delivering automated scalability and high availability when deploying it in: (1) the edge using balenaCloud; (2) the Amazon Web Services cloud with EC2 instances; and (3) the dedicated Amazon Web Services IoT service. The experiments showed that there are no significant differences between edge and cloud deployments regarding resource consumption. Secondly, the solutions for scaling the 4G/5G network functions and mobile backhaul that provide the connectivity between devices and IoT/M2M applications are analyzed. In this case, the scalability and high availability of the 4G/5G components are provided by Kubernetes. The experiments showed that our proposed scaling algorithm for network slicing managed with SDN guarantees the necessary radio and network resources for end-to-end high availability.
APA, Harvard, Vancouver, ISO, and other styles
12

Sayed, Fauziya. "Smart Parking System using IoT and Cloud." International Journal for Research in Applied Science and Engineering Technology 9, no. VI (June 14, 2021): 853–56. http://dx.doi.org/10.22214/ijraset.2021.35084.

Full text
Abstract:
An efficient and smart way to automate the management of parking system that allocates an efficient parking space using internet of things technology. The IoT provides wireless access to the system and the user can keep a track of the availability of the parking area. In this system, the user can easily view this availability by using a simple android application that monitors the real-time database and updates in a cloud database. This application will also provide the facility of payment for the toll fee.
APA, Harvard, Vancouver, ISO, and other styles
13

Mecca, Giansalvatore, Michele Santomauro, Donatello Santoro, and Enzo Veltri. "IoT Helper: A Lightweight and Extensible Framework for Fast-Prototyping IoT Architectures." Applied Sciences 11, no. 20 (October 17, 2021): 9670. http://dx.doi.org/10.3390/app11209670.

Full text
Abstract:
Industry 4.0 is focused on the task of creating Smart Factories, which require the automation of traditional industrial processes and the fully connection and integration of different systems and devices. However, despite the wide availability of tools and technology, developing intelligent applications in the industry framework remains a complex and expensive task. This paper proposes a lightweight, extensible and scalable framework called IoT Helper to facilitate the adoption of IoT and IIoT solutions both in industry and domotics. The framework is designed to be highly flexible and declarative in nature, thus allowing for a wide range of configurations with minimal user efforts. To emphasize the practical applicability or our proposal, we present two real-life use cases where the framework was successfully adopted. We also investigate a crucial aspect of these applications, i.e., what level of scalability can be achieved with a lean generic framework based on inexpensive components such as ours. Comprehensive experimental results show the excellent cost-to-performance ratio of our solution. We consider this to be an important contribution because it paves the way for a more widespread adoption of IIoT-enabling technologies in industry.
APA, Harvard, Vancouver, ISO, and other styles
14

Wu, Xiaojun, Qiying Cao, Juan Jin, Yuanjie Li, and Hong Zhang. "Nodes Availability Analysis of NB-IoT Based Heterogeneous Wireless Sensor Networks under Malware Infection." Wireless Communications and Mobile Computing 2019 (January 3, 2019): 1–9. http://dx.doi.org/10.1155/2019/4392839.

Full text
Abstract:
The Narrowband Internet of Things (NB-IoT) is a main stream technology based on mobile communication system. The combination of NB-IoT and WSNs can active the application of WSNs. In order to evaluate the influence of node heterogeneity on malware propagation in NB-IoT based Heterogeneous Wireless Sensor Networks, we propose a node heterogeneity model based on node distribution and vulnerability differences, which can be used to analyze the availability of nodes. We then establish the node state transition model by epidemic theory and Markov chain. Further, we obtain the dynamic equations of the transition between nodes and the calculation formula of node availability. The simulation result is that when the degree of node is small and the node vulnerability function is a power function, the node availability is the highest; when the degree of node is large and the node vulnerability function satisfies the exponential function and the power function, the node availability is high. Therefore, when constructing a NBIOT-HWSNs network, node protection is implemented according to the degree of node, so that when the node vulnerability function satisfies the power function, all nodes can maintain high availability, thus making the entire network more stable.
APA, Harvard, Vancouver, ISO, and other styles
15

Nugraha, Nikko Aji Bayu, and Mashoedah. "Oxygen Availability Control and Monitoring System in Hospitals using IoT." Journal of Physics: Conference Series 2111, no. 1 (November 1, 2021): 012016. http://dx.doi.org/10.1088/1742-6596/2111/1/012016.

Full text
Abstract:
Abstract Medical Gas is an important component in the treatment of patients with COVID-19 disease. Medical gas is used to help COVID-19 patients to reduce the effects of respiratory disorders by providing oxygen ventilators to patients. With the surge in typical COVID-19 sufferers as of July 2021, the need for Oxygen in hospitals is getting higher. This is when the control and monitoring of medical gases in hospitals are late because the integrated system is very dangerous. Therefore, a system that can be used to control and monitor medical gases in hospitals that are integrated and automated and can be monitored by the Government and Medical Gas Producers. This is useful for anticipating the lack of availability of Medical Gas in hospitals. In this study, the system used IoT systems as a base in delivery and control. This system uses Arduino as a minimum system that reads the press sensor on the Medical Gas tube and regulates the valve. The data obtained is then sent to the Local Server to be processed and delivered to the Hospital Officer. Local Servers also send the data to cloud servers to be monitored by the government funds of several medical gas producers. This design can help in the process of controlling and monitoring Medical Gases in hospitals in hopes of minimizing the risk of delays in supplying medical gases to hospitals.
APA, Harvard, Vancouver, ISO, and other styles
16

Corches, Cosmina, Mihai Daraban, and Liviu Miclea. "Availability of an RFID Object-Identification System in IoT Environments." Sensors 21, no. 18 (September 16, 2021): 6220. http://dx.doi.org/10.3390/s21186220.

Full text
Abstract:
Through the latest technological and conceptual developments, the centralized cloud-computing approach has moved to structures such as edge, fog, and the Internet of Things (IoT), approaching end users. As mobile network operators (MNOs) implement the new 5G standards, enterprise computing function shifts to the edge. In parallel to interconnection topics, there is the issue of global impact over the environment. The idea is to develop IoT devices to eliminate the greenhouse effect of current applications. Radio-frequency identification (RFID) is the technology that has this potential, and it can be used in applications ranging from identifying a person to granting access in a building. Past studies have focused on how to improve RFID communication or to achieve maximal throughput. However, for many applications, system latency and availability are critical aspects. This paper examines, through stochastic Petri nets (SPNs), the availability, dependability, and latency of an object-identification system that uses RFID tags. Through the performed analysis, the optimal balance between latency and throughput was identified. Analyzing multiple communication scenarios revealed the availability of such a system when deployed at the edge layer.
APA, Harvard, Vancouver, ISO, and other styles
17

Ge, Mengmeng, Jin-Hee Cho, Dongseong Kim, Gaurav Dixit, and Ing-Ray Chen. "Proactive Defense for Internet-of-things: Moving Target Defense With Cyberdeception." ACM Transactions on Internet Technology 22, no. 1 (February 28, 2022): 1–31. http://dx.doi.org/10.1145/3467021.

Full text
Abstract:
Resource constrained Internet-of-Things (IoT) devices are highly likely to be compromised by attackers, because strong security protections may not be suitable to be deployed. This requires an alternative approach to protect vulnerable components in IoT networks. In this article, we propose an integrated defense technique to achieve intrusion prevention by leveraging cyberdeception (i.e., a decoy system) and moving target defense (i.e., network topology shuffling). We evaluate the effectiveness and efficiency of our proposed technique analytically based on a graphical security model in a software-defined networking (SDN)-based IoT network. We develop four strategies (i.e., fixed/random and adaptive/hybrid) to address “when” to perform network topology shuffling and three strategies (i.e., genetic algorithm/decoy attack path-based optimization/random) to address “how” to perform network topology shuffling on a decoy-populated IoT network, and we analyze which strategy can best achieve a system goal, such as prolonging the system lifetime, maximizing deception effectiveness, maximizing service availability, or minimizing defense cost. We demonstrated that a software-defined IoT network running our intrusion prevention technique at the optimal parameter setting prolongs system lifetime, increases attack complexity of compromising critical nodes, and maintains superior service availability compared with a counterpart IoT network without running our intrusion prevention technique. Further, when given a single goal or a multi-objective goal (e.g., maximizing the system lifetime and service availability while minimizing the defense cost) as input, the best combination of “when” and “how” strategies is identified for executing our proposed technique under which the specified goal can be best achieved.
APA, Harvard, Vancouver, ISO, and other styles
18

Sim, Sungho, and Hanyong Choi. "A study on the service discovery support method in the IoT environments." International Journal of Electrical Engineering & Education 57, no. 1 (December 5, 2018): 85–96. http://dx.doi.org/10.1177/0020720918813824.

Full text
Abstract:
The fourth Industrial Revolution is rapidly growing due to the development of ICT and the need for organic linkage in the industry. The Internet of Things (IoT), in which objects and objects from active relationships such as sensing, networking and mutual cooperation without human intervention is the core technology of the fourth Industrial Revolution, which can be linked to various industrial fields. As the IoT environment spreads, IoT devices are continuously increasing in various industries. IoT devices connected to the Internet are as different as each application environment. Many information is derived from the interaction between an IoT device and a device or between a human and an IoT device, as well as devices that provide simple data such as sensing. This paper proposes a support method to enable extended service search when users search for services using information generated in IoT environment. The existing service discovery method focuses on the method by which the user selects the service based on the simple service information disclosed by the service provider. In order to solve the problem of existing service discovery method, this study proposed a support method that enables users to search service discovery flexibly even when using existing methods in service discovery in IoT environment. The proposed method provides a user-centered service search environment construction through a search method using user IoT information which was not considered in the existing service search. This makes up for the problem of service availability and provider-oriented service discovery through the establishment of a user service discovery environment.
APA, Harvard, Vancouver, ISO, and other styles
19

Farooq, Hira, Hafeez UR Rehman, Anam Javed, Mehnaz Shoukat, and Sandra Dudely. "A Review on Smart IoT Based Farming." Annals of Emerging Technologies in Computing 4, no. 3 (July 1, 2020): 17–28. http://dx.doi.org/10.33166/aetic.2020.03.003.

Full text
Abstract:
With the increase of world population, the availability of food to all inhabitants on globe is one of the significant challenges. These challenges need to be addressed by adopting innovative options to improve the soil capacity and the safety of environmental resources. The availability of real-time vital parameters related to farming such as moisture, temperature, weather, crops diseases and water management as well as predictive actions against the changes in parameters can provide great help to deal with these challenges. Internet of Things (IoT) is an evolving technology, has great potential to play and prevail its miraculous role in almost every field. IoT is a network of things that are capable of self-configuring network. The development of intelligent IoT based Smart farming is day by day getting its space in developed countries. It facilitates towards precision agriculture and turning the face of agriculture production. Subsequently, it is reducing spoilage of resources such as water, fertilizers, operating cost. The availability and development of cost effective smart miniaturized sensors, processors and communication technologies has made IoT based smart farming feasible. This paper aims to review most recent papers from year 2015 to 2020 in IoT based farming domain. The recent work is highlighted in terms of their scope, methodology and summarised in a table followed by discussion and analysis. The intention is to provide a platform for the future researchers to get a start towards a system with a single standard expert and complete autonomous assistive system.
APA, Harvard, Vancouver, ISO, and other styles
20

Ghaffari, Kimia, Mohammad Lagzian, Mostafa Kazemi, and Gholamreza Malekzadeh. "A comprehensive framework for Internet of Things development." Journal of Enterprise Information Management 33, no. 1 (November 13, 2019): 23–50. http://dx.doi.org/10.1108/jeim-02-2019-0060.

Full text
Abstract:
Purpose Despite the availability of prior studies on the Internet of Things (IoT) development, they have largely focused on challenges associated with evolving IoT. Hence, identifying requirements for IoT development, as a multifaceted phenomenon, whereby the challenges would be tackled remains a less-explored valuable line of inquiry. The purpose of this paper is to present a holistic view of crucial building blocks of IoT development, in order to fill this gap. Design/methodology/approach This paper conducts empirical research using a grounded theory (GT), centering on semi-structured interviews with 25 experts involved in the Iranian IoT development effort. Data were analyzed by using MAXQDA software. Findings This study presents a conceptual framework of requirements for IoT development, consisting of 14 concepts and 5 categories. The findings reveal that strategic, interactive, institutional, market-oriented and information and communication technology (ICT) infrastructure requirements play a salient role in facilitating IoT development. Practical implications The findings of this study shed some light on the momentous aspects of IoT development. Practitioners including governmental policymakers, industry and private sectors could benefit from the policy recommendations offered in this study in terms of strategic viewpoint, legal issues, business perspective and technological readiness. Originality/value From the methodological aspect, the present research is among the first studies on utilizing GT for exploration of requirements for IoT development. From the theoretical perspective, a remarkable achievement of this study is to profoundly discover some less-explored concepts of IoT development such as commercialization, feasibility study, futurology and institutional aspects. Furthermore, findings of this study highlight the contribution of innovation systems theory for the IoT development area in terms of alignment of the emerged requirements for IoT development with the functions of this theory.
APA, Harvard, Vancouver, ISO, and other styles
21

Chan, Chiu Chun, Akram Al-Hourani, Jinho Choi, Karina Mabell Gomez, and Sithamparanathan Kandeepan. "Performance Modeling Framework for IoT-over-Satellite Using Shared Radio Spectrum." Remote Sensing 12, no. 10 (May 22, 2020): 1666. http://dx.doi.org/10.3390/rs12101666.

Full text
Abstract:
Delivering Internet-of-Things (IoT) connectivity over satellite is a promising solution for applications in remote and sparsely populated areas. These applications range from smart agriculture, logistics, asset tracking to emergency services. Using a shared radio spectrum with terrestrial services will facilitate a cost-effective and rapid deployment of IoT-over-Satellite since it reduces the administrative and financial hurdles of leasing a dedicated segment of the spectrum. Although IoT-over-Satellite communication provides larger service coverage, the vast number of IoT devices also increase the interference in the satellite uplink channel, and it becomes a significant challenge for the reliable performance of the IoT-over-satellite. In this paper, we propose a framework for modeling the performance of IoT-over-Satellite access systems when sharing the radio spectrum with terrestrial networks. We take into consideration several important aspects, namely; satellite orbit, terrestrial IoT devices uplink interference, atmosphere and gas absorption, and the probability of line-of-sight. The performance of the overall system is presented in terms of the uplink signal-to-interference-plus-noise ratio (SINR), and thus the time-availability of the satellite link during a typical pass. We focus on low earth orbit satellites due to their potential use in IoT applications, where we evaluate the framework using actual parameters of satellites located in 300–800 km orbits. Furthermore, the paper presents a numercial model to obtain the most suitable antenna beamwidth that maximizes the link-availability of the satellite link by the simultaneous reduction in the terrestrial interference and the boosting of the underlying IoT signal of interest.
APA, Harvard, Vancouver, ISO, and other styles
22

Zikria, Yousaf Bin, Sung Won Kim, Oliver Hahm, Muhammad Khalil Afzal, and Mohammed Y. Aalsalem. "Internet of Things (IoT) Operating Systems Management: Opportunities, Challenges, and Solution." Sensors 19, no. 8 (April 15, 2019): 1793. http://dx.doi.org/10.3390/s19081793.

Full text
Abstract:
Internet of Things (IoT) is rapidly growing and contributing drastically to improve the quality of life. Immense technological innovations and growth is a key factor in IoT advancements. Readily available low cost IoT hardware is essential for continuous adaptation of IoT. Advancements in IoT Operating System (OS) to support these newly developed IoT hardware along with the recent standards and techniques for all the communication layers are the way forward. The variety of IoT OS availability demands to support interoperability that requires to follow standard set of rules for development and protocol functionalities to support heterogeneous deployment scenarios. IoT requires to be intelligent to self-adapt according to the network conditions. In this paper, we present brief overview of different IoT OSs, supported hardware, and future research directions. Therein, we provide overview of the accepted papers in our Special Issue on IoT OS management: opportunities, challenges, and solution. Finally, we conclude the manuscript.
APA, Harvard, Vancouver, ISO, and other styles
23

Haque, A. K. M. Bahalul, and Sonia Tasmin. "Security Threats and Research Challenges of IoT - A Review." Journal of Engineering Advancements 01, no. 04 (December 2020): 170–82. http://dx.doi.org/10.38032/jea.2020.04.008.

Full text
Abstract:
Internet of things (IoT) is the epitome of sustainable development. It has facilitated the development of smart systems, industrialization, and the state-of-the-art quality of life. IoT architecture is one of the essential baselines of understanding the widespread adoption. Security issues are very crucial for any technical infrastructure. Since IoT comprises heterogeneous devices, its security issues are diverse too. Various security attacks can be responsible for compromising confidentiality, integrity, and availability. In this paper, at first, the IoT architecture is described briefly. After that, the components of IoT are explained with perspective to various IoT based applications and services. Finally, various security issues, including recommended solutions, are elaborately described and the potential research challenges and future research directions.
APA, Harvard, Vancouver, ISO, and other styles
24

Kumar Yadav, Rajesh, Rishabh Dev, Tushar Mann, and Tarun Verma. "IoT Based Irrigation System." International Journal of Engineering & Technology 7, no. 4.5 (September 22, 2018): 130. http://dx.doi.org/10.14419/ijet.v7i4.5.20028.

Full text
Abstract:
Availability of fresh water is one of the elementary conditions for life on Earth, however, water is a limited resource, which is now under an unprecedented pressure by global population growth, climate change and demand from several economic sectors. In particular, irrigated agriculture is one of the major water-consuming sectors. The aforementioned issues justify the need for a sustainable and rational use of water in irrigated crops.An IoT based irrigation system helps in supplying adequate amount of water to field and domestic crops in all seasons with minimum human interference. To deliver the required amount of water to the soil, we developed a system which works on the data obtained from the sensor nodes about the surroundings. The approach used helped in increasing the lifespan of the sensor nodes. Since the crop was being provided by adequate amount of water, the quality of crop increased.
APA, Harvard, Vancouver, ISO, and other styles
25

Prudenzi, A., A. Fioravanti, and M. Regoli. "A low-cost IoT solution for power availability improvement in hospitals." Renewable Energy and Power Quality Journal 1 (April 2018): 566–71. http://dx.doi.org/10.24084/repqj16.389.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Hammoudi, Sarra, Saad Harous, and Zibouda Aliouat. "A Robust IOT-Cloud IaaS for Data Availability within Minimum Latency." International Journal of Strategic Information Technology and Applications 10, no. 4 (October 2019): 16–32. http://dx.doi.org/10.4018/ijsita.2019100102.

Full text
Abstract:
Sensors in Internet of Things generate a huge amount of data. The massive volume of the captured data is stored on cloud servers. Over time, the unbalanced load servers prevent better resource utilization. It also increases the input and the output response time. Hence, applying load balancing techniques is very important to achieve efficient system performance. Ensuring the critical data availability in such dynamic systems is very essential. In this article, the authors propose ROBUST for ensuring data availability mechanism and a fault-tolerance architecture. ROBUST also realises load balancing among servers within minimum latency, by avoiding the problem of the overloaded sites and unbalanced use of the resources on the servers. Comparing the response time using the ROBUST and Load Balancing in the Cloud Using Specialization (LBCS), ROBUST architecture has given satisfactory results in terms of critical data latency. Compared with LBCS, ROBUST gains 42% critical data recovery from a primary server and 45% when searching for duplicated critical data. The authors implemented the system using the JADE platform.
APA, Harvard, Vancouver, ISO, and other styles
27

Yang, Hyunsik, and Younghan Kim. "Design and Implementation of Fast Fault Detection in Cloud Infrastructure for Containerized IoT Services." Sensors 20, no. 16 (August 16, 2020): 4592. http://dx.doi.org/10.3390/s20164592.

Full text
Abstract:
The container-based cloud is used in various service infrastructures as it is lighter and more portable than a virtual machine (VM)-based infrastructure and is configurable in both bare-metal and VM environments. The Internet-of-Things (IoT) cloud-computing infrastructure is also evolving from a VM-based to a container-based infrastructure. In IoT clouds, the service availability of the cloud infrastructure is more important for mission-critical IoT services, such as real-time health monitoring, vehicle-to-vehicle (V2V) communication, and industrial IoT, than for general computing services. However, in the container environment that runs on a VM, the current fault detection method only considers the container’s infra, thus limiting the level of availability necessary for the performance of mission-critical IoT cloud services. Therefore, in a container environment running on a VM, fault detection and recovery methods that consider both the VM and container levels are necessary. In this study, we analyze the fault-detection architecture in a container environment and designed and implemented a Fast Fault Detection Manager (FFDM) architecture using OpenStack and Kubernetes for realizing fast fault detection. Through performance measurements, we verified that the FFDM can improve the fault detection time by more than three times over the existing method.
APA, Harvard, Vancouver, ISO, and other styles
28

Tanganelli, Giacomo, and Enzo Mingozzi. "Energy-Efficient IoT Service Brokering with Quality of Service Support." Sensors 19, no. 3 (February 8, 2019): 693. http://dx.doi.org/10.3390/s19030693.

Full text
Abstract:
The Internet of Things (IoT) is becoming real, and recent studies highlight that the number of IoT devices will significantly grow in the next decade. Such massive IoT deployments are typically made available to applications as a service by means of IoT platforms, which are aware of the characteristics of the connected IoT devices–usually constrained in terms of computation, storage and energy capabilities–and dispatch application’s service requests to appropriate devices based on their capabilities. In this work, we develop an energy-aware allocation policy that aims at maximizing the lifetime of all the connected IoT devices, whilst guaranteeing that applications’ Quality of Service (QoS) requirements are met. To this aim, we formally define an IoT service allocation problem as a non-linear Generalized Assignment Problem (GAP). We then develop a time-efficient heuristic algorithm to solve the problem, which is shown to find near-optimal solutions by exploiting the availability of equivalent IoT services provided by multiple IoT devices, as expected especially in the case of massive IoT deployments.
APA, Harvard, Vancouver, ISO, and other styles
29

Iggena, Thorben, Eushay Bin Bin Ilyas, Marten Fischer, Ralf Tönjes, Tarek Elsaleh, Roonak Rezvani, Narges Pourshahrokhi, et al. "IoTCrawler: Challenges and Solutions for Searching the Internet of Things." Sensors 21, no. 5 (February 24, 2021): 1559. http://dx.doi.org/10.3390/s21051559.

Full text
Abstract:
Due to the rapid development of the Internet of Things (IoT) and consequently, the availability of more and more IoT data sources, mechanisms for searching and integrating IoT data sources become essential to leverage all relevant data for improving processes and services. This paper presents the IoT search framework IoTCrawler. The IoTCrawler framework is not only another IoT framework, it is a system of systems which connects existing solutions to offer interoperability and to overcome data fragmentation. In addition to its domain-independent design, IoTCrawler features a layered approach, offering solutions for crawling, indexing and searching IoT data sources, while ensuring privacy and security, adaptivity and reliability. The concept is proven by addressing a list of requirements defined for searching the IoT and an extensive evaluation. In addition, real world use cases showcase the applicability of the framework and provide examples of how it can be instantiated for new scenarios.
APA, Harvard, Vancouver, ISO, and other styles
30

Choi, Sun-O., and Jongbae Kim. "Design and Implementation of IoT Platform Education System Based on Open Source Hardware." International Journal of Software Innovation 10, no. 1 (January 1, 2022): 1–10. http://dx.doi.org/10.4018/ijsi.304878.

Full text
Abstract:
The IoT is the very critical core to 4th industrial revolution that will lead to hyper-connectivity, hyper-intelligence and hyper-reality. Recently, the importance of software, electronics, mechanical, and convergence education has emerged, and thanks to this, research and development for IoT platform educational equipment is in progress. However, in the educational field, practical devices for IoT education, namely, various sensors, breadboards, Arduino, and Raspberry Pi are purchased and used respectively. This problem is due to the lack of integrated IoT platform educational equipment. In this study, an integrated IoT platform education system based on open source hardware was the operation and performance are verified by using IoT platform system where various sensor and device module are equipped and controlled. The IoT in this article has strong points in openness, compatibility, high availability, economy and space utilization, which is to expected to improve the efficiency an educational field.
APA, Harvard, Vancouver, ISO, and other styles
31

Toka, K. O., Y. Dikilitaş, T. Oktay, and A. Sayar. "SECURING IOT WITH BLOCKCHAIN." International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences XLVI-4/W5-2021 (December 23, 2021): 529–32. http://dx.doi.org/10.5194/isprs-archives-xlvi-4-w5-2021-529-2021.

Full text
Abstract:
Abstract. IoT is becoming ubiquitous in industry, homes, cities, literally in every aspect of our daily lives. Securing IoT-based systems is difficult because of deficiencies in the very nature of IoT devices such as limited battery power, processing, and storage, etc. Blockchain is a new approach used to securely record transactions and offers potential solutions to computer and internet security issues such as confidentiality, integrity, availability, authentication, authorization, and accountability. Blockchain, as a decentralized ledger consisting of interconnected blocks, can remedy most of the security deficiencies of heavily IoT based systems. The Hyperledger Fabric blockchain network used in this study provides confidentiality, data integrity, authentication, and data security for data obtained from IoT devices. Widely used IoT data transfer MQTT protocol is included in the proposed approach. The approach is demonstrated in a simple demo Hyperledger network with simulated IoT devices. The proposed approach is discussed in terms of network security dimensions. Based on the features of the Hyperledger Blockchain network, it is displayed that the IoT security deficiencies can largely be remedied with the proposed approach.
APA, Harvard, Vancouver, ISO, and other styles
32

M G, Padmashree, Mallikarjun J P, Arunalatha J S, and Venugopal K R. "MEKDA: Multi-Level ECC based Key Distribution and Authentication in Internet of Things." International journal of Computer Networks & Communications 13, no. 6 (September 30, 2021): 19–39. http://dx.doi.org/10.5121/ijcnc.2021.13602.

Full text
Abstract:
The Internet of Things (IoT) is an extensive system of networks and connected devices with minimal human interaction and swift growth. The constraints of the System and limitations of Devices pose several challenges, including security; hence billions of devices must protect from attacks and compromises. The resource-constrained nature of IoT devices amplifies security challenges. Thus standard data communication and security measures are inefficient in the IoT environment. The ubiquity of IoT devices and their deployment in sensitive applications increase the vulnerability of any security breaches to risk lives. Hence, IoT-related security challenges are of great concern. Authentication is the solution to the vulnerability of a malicious device in the IoT environment. The proposed Multi-level Elliptic Curve Cryptography based Key Distribution and Authentication in IoT enhances the security by Multi-level Authentication when the devices enter or exit the Cluster in an IoT system. The decreased Computation Time and Energy Consumption by generating and distributing Keys using Elliptic Curve Cryptography extends the availability of the IoT devices. The Performance analysis shows the improvement over the Fast Authentication and Data Transfer method.
APA, Harvard, Vancouver, ISO, and other styles
33

Aranda Muñoz, Álvaro, Yvonne Eriksson, Yuji Yamamoto, Ulrika Florin, and Kristian Sandström. "TO SUPPORT IOT COLLABORATIVE EXPRESSIVENESS ON THE SHOP FLOOR." Proceedings of the Design Society 1 (July 27, 2021): 3149–58. http://dx.doi.org/10.1017/pds.2021.576.

Full text
Abstract:
AbstractThe availability of new research for IoT support and the human-centric perspective of industry 4.0 opens a gap to support operators in unleashing their creativity so they can provide improvements opportunities with IoT technology. This paper presents a case-study carried out in four Swedish manufacturing companies, where four different workshops were facilitated to support operators in the conceptualization of manufacturing improvements with IoT technologies. The empirical material gathered during these workshops has been analyzed in five different reflective sessions and discussed in light of previous research from industry 4.0, operators, and IoT support. Results indicate that operators can collaboratively create conceptual IoT solutions and that expressiveness in communicating their ideas and needs using IoT technology is more relevant than technical aspects and details of their proposed IoT solutions. This technological expressiveness is identified as a necessary skill to be cultivated on the shop floor and can potentially contribute to making a more effective and socially sustainable industrial landscape in the future.
APA, Harvard, Vancouver, ISO, and other styles
34

Braganza, Denver, and B. Tulasi. "RFID Security Issues in IoT: A Comparative Study." Oriental journal of computer science and technology 10, no. 1 (March 15, 2017): 127–34. http://dx.doi.org/10.13005/ojcst/10.01.17.

Full text
Abstract:
The landscape of Internet of Things (IoT) has been evolving at an increasing rate over the recent years. With the ease of availability of mobile devices, there has been a tremendous leap in technology associated with it. Thus, the need for efficient intercommunication among these devices arises. To ensure that IoT is seamlessly integrated into the daily life of people using appropriate technology is essential. One of the important associated technologies with IoT is RFID. RFID proves to be a simpler and efficient technology to implement IoT at various levels. Since IoT is greatly imapcting the lives of people, one of the major concerns of IoT is the security. IoT will have millions of devices and users connected to each other. It is important to authenticate both users and devices to prevent any breach of information. With the limitations in RFID technology, various authentication protocols have been developed to provide optimal solutions.
APA, Harvard, Vancouver, ISO, and other styles
35

Clark, M'Kaila J., and Lila Rajabion. "A Strategic Approach to IoT Security by Working Towards a Secure IoT Future." International Journal of Hyperconnectivity and the Internet of Things 7, no. 1 (February 3, 2023): 1–18. http://dx.doi.org/10.4018/ijhiot.317088.

Full text
Abstract:
The internet of things' (IoT) fast-growing development and adoption are undeniable. Although the IoT development is moving at a fast rate, the security of these technologies is not keeping up. Lack of security infrastructure on the internet of things is due to such security measures being excluded from the average company business plan and the lack of security configurations established. The increasing need for robust security architecture is needed to address said vulnerabilities. How do the internet of things companies create a dynamic security approach to defend and combat threats while also being flexible to accommodate future technological advancements? This paper will answer this question by addressing the strategic approach to developing a strong IoT security infrastructure that promotes confidentiality, integrity, and availability with dynamic elements that allow for future developments to address new security concerns. This research question will be answered through analysis of extensive thematic literature review.
APA, Harvard, Vancouver, ISO, and other styles
36

Muthanna, Ammar, Abdelhamied A. Ateya, Abdukodir Khakimov, Irina Gudkova, Abdelrahman Abuarqoub, Konstantin Samouylov, and Andrey Koucheryavy. "Secure and Reliable IoT Networks Using Fog Computing with Software-Defined Networking and Blockchain." Journal of Sensor and Actuator Networks 8, no. 1 (February 18, 2019): 15. http://dx.doi.org/10.3390/jsan8010015.

Full text
Abstract:
Designing Internet of Things (IoT) applications faces many challenges including security, massive traffic, high availability, high reliability and energy constraints. Recent distributed computing paradigms, such as Fog and multi-access edge computing (MEC), software-defined networking (SDN), network virtualization and blockchain can be exploited in IoT networks, either combined or individually, to overcome the aforementioned challenges while maintaining system performance. In this paper, we present a framework for IoT that employs an edge computing layer of Fog nodes controlled and managed by an SDN network to achieve high reliability and availability for latency-sensitive IoT applications. The SDN network is equipped with distributed controllers and distributed resource constrained OpenFlow switches. Blockchain is used to ensure decentralization in a trustful manner. Additionally, a data offloading algorithm is developed to allocate various processing and computing tasks to the OpenFlow switches based on their current workload. Moreover, a traffic model is proposed to model and analyze the traffic indifferent parts of the network. The proposed algorithm is evaluated in simulation and in a testbed. Experimental results show that the proposed framework achieves higher efficiency in terms of latency and resource utilization.
APA, Harvard, Vancouver, ISO, and other styles
37

Malaquias, Rodrigo Fernandes, and Alberto Luiz Albertin. "Challenges for development and technological advancement." Information Development 35, no. 3 (January 31, 2018): 413–20. http://dx.doi.org/10.1177/0266666918756170.

Full text
Abstract:
This study addresses the challenges for development in Latin America considering the framework of a contemporary technological advancement: the Internet of Things (IoT). Based on this framework, this paper shows the diffusion of IoT-related aspects in three different dimensions: individuals (demand), environment, and technology offer. The low availability of secure Internet servers, the low widespread rate of Internet adoption, inequalities in access to electricity, and adult illiteracy represent important challenges to be faced in Latin America. These variables directly affect IoT diffusion; thus, this paper also presents further directions in this field.
APA, Harvard, Vancouver, ISO, and other styles
38

Aridoss, Manimaran. "Defensive Mechanism Against DDoS Attack to Preserve Resource Availability for IoT Applications." International Journal of Handheld Computing Research 8, no. 4 (October 2017): 40–51. http://dx.doi.org/10.4018/ijhcr.2017100104.

Full text
Abstract:
The major challenge of Internet of Things (IoT) generated data is its hypervisor level vulnerabilities. Malicious VM deployment and termination are so simple due to its multitenant shared nature and distributed elastic cloud features. These features enable the attackers to launch Distributed Denial of Service attacks to degrade cloud server performance. Attack detection techniques are applied to the VMs that are used by malicious tenants to hold the cloud resources by launching DDoS attacks at data center subnets. Traditional dataflow-based attack detection methods rely on the similarities of incoming requests which consist of IP and TCP header information flows. The proposed approach classifies the status patterns of malicious VMs and ideal VMs to identify the attackers. In this article, information theory is used to calculate the entropy value of the malicious virtual machines for detecting attack behaviors. Experimental results prove that the proposed system works well against DDoS attacks in IoT applications.
APA, Harvard, Vancouver, ISO, and other styles
39

Algarni, Sultan, Fathy Eassa, Khalid Almarhabi, Abduallah Almalaise, Emad Albassam, Khalid Alsubhi, and Mohammad Yamin. "Blockchain-Based Secured Access Control in an IoT System." Applied Sciences 11, no. 4 (February 17, 2021): 1772. http://dx.doi.org/10.3390/app11041772.

Full text
Abstract:
The distributed nature of Internet of Things (IoT) and its rapid increase on a large scale raises many security and privacy issues. Access control is one of the major challenges currently addressed through centralized approaches that may rely on a third party and they are constrained by availability and scalability, which may result in a performance bottleneck. Therefore, this paper proposes a novel solution to manage the delivery of lightweight and decentralized secure access control of an IoT system based on a multi-agent system and a blockchain. The main objective of the proposed solution is to build Blockchain Managers (BCMs) for securing IoT access control, as well as allowing for secure communication between local IoT devices. Moreover, the solution also enables secure communication between IoT devices, fog nodes and cloud computing.
APA, Harvard, Vancouver, ISO, and other styles
40

Yu, Heejung, and Yousaf Bin Zikria. "Cognitive Radio Networks for Internet of Things and Wireless Sensor Networks." Sensors 20, no. 18 (September 16, 2020): 5288. http://dx.doi.org/10.3390/s20185288.

Full text
Abstract:
Recent innovation, growth, and deployment of internet of things (IoT) networks are changing the daily life of people. 5G networks are widely deployed around the world, and they are important for continuous growth of IoT. The next generation cellular networks and wireless sensor networks (WSN) make the road to the target of the next generation IoT networks. The challenges of the next generation IoT networks remain in reducing the overall network latency and increasing throughput without sacrificing reliability. One feasible alternative is coexistence of networks operating on different frequencies. However, data bandwidth support and spectrum availability are the major challenges. Therefore, cognitive radio networks (CRN) are the best available technology to cater to all these challenges for the co-existence of IoT, WSN, 5G, and beyond-5G networks.
APA, Harvard, Vancouver, ISO, and other styles
41

Blanchard, Yvon. "Design and Improvement of Air Pollution Monitoring System based on IoT Network for Smart Cities." Pollution Engineering 48, no. 1 (October 26, 2020): 03–04. http://dx.doi.org/10.17762/pe.v48i1.19.

Full text
Abstract:
Ecological boundary observing has become significant worry in present day megalopolis because of transformation and progression. Presently, air pollution is a major issue for individual’s wellbeing in urban communities that experienced the more feature, for example, the traffic, modern, or backwoods fire or contaminated skies. The planned framework utilizes IOT which gives an affordable and a viable framework to screen air effluence level specifically territory. IOT engages tremendous extent of elements and physical world subtleties. For offer intriguing administrations, to trade and impart data, IOT installs availability with dynamic capacity among gadgets can be utilized. The methodology of framework characterizes a modified structure of IOT pedestal checking gadgets which decide the degrees of poisonous in gaspresent over air.
APA, Harvard, Vancouver, ISO, and other styles
42

Dinh, Ngoc-Thanh, and Younghan Kim. "An Efficient Availability Guaranteed Deployment Scheme for IoT Service Chains over Fog-Core Cloud Networks." Sensors 18, no. 11 (November 15, 2018): 3970. http://dx.doi.org/10.3390/s18113970.

Full text
Abstract:
High availability is one of the important requirements of many end-to-end services in the Internet of Things (IoT). This is a critical issue in network function virtualization (NFV) and NFV-enabled service function chaining (SFC) due to hard- and soft-ware failures. Thus, merely mapping primary VNFs is not enough to ensure high availability, especially for SFCs deployed over fog - core cloud networks due to resource limitations of fogs. As a result, additional protection schemes, like VNF redundancy deployments, are required to improve the availability of SFCs to meet predefined requirements. With limited resources of fog instances, a cost-efficient protection scheme is required. This paper proposes a cost-efficient availability guaranteed deployment scheme for IoT services over fog-core cloud networks based on measuring the improvement potential of VNFs for improving the availability of SFCs. In addition, various techniques for redundancy placement for VNFs at the fog layer are also presented. Obtained analysis and simulation results show that the proposed scheme achieves a significant improvement in terms of the cost efficiency and scalability compared to the state-of-the-art approaches.
APA, Harvard, Vancouver, ISO, and other styles
43

Araujo, Eltton, Paulo Pereira, Jamilson Dantas, and Paulo Maciel. "Dependability Impact in the Smart Solar Power Systems: An Analysis of Smart Buildings." Energies 14, no. 1 (December 29, 2020): 124. http://dx.doi.org/10.3390/en14010124.

Full text
Abstract:
The Internet has been going through significant transformations and changing the world around us. We can also see the Internet to be used in many areas, for innumerable purposes, and, currently, it is even used by objects. This evolution leads to the Internet of Things (IoT) paradigm. This new concept can be defined as a system composed of storage resources, sensor devices, controllers, applications, and network infrastructure, in order to provide specific services to its users. Since IoT comprises heterogeneous components, the creation of these systems, the communication, and maintenance of their components became a complex task. In this paper, we present a dependability model to evaluate an IoT system. Amid different systems, we chose to assess availability in a smart building. The proposed models allow us to calculate estimations of other measures besides steady-state availability, such as reliability. Thus, it was possible to notice that there was no considerable gain of availability in the system when applying grid-tie solar power or off-grid solar power. The grid-tie solar power system is cheaper than the off-grid solar power system, even though it produces more energy. However, in our research, we were able to observe that the off-grid solar power system recovers the applied financial investment in smaller interval of time.
APA, Harvard, Vancouver, ISO, and other styles
44

Trajanovski, Tolijan, and Ning Zhang. "An Automated Behaviour-Based Clustering of IoT Botnets." Future Internet 14, no. 1 (December 23, 2021): 6. http://dx.doi.org/10.3390/fi14010006.

Full text
Abstract:
The leaked IoT botnet source-codes have facilitated the proliferation of different IoT botnet variants, some of which are equipped with new capabilities and may be difficult to detect. Despite the availability of solutions for automated analysis of IoT botnet samples, the identification of new variants is still very challenging because the analysis results must be manually interpreted by malware analysts. To overcome this challenge, we propose an approach for automated behaviour-based clustering of IoT botnet samples, aimed to enable automatic identification of IoT botnet variants equipped with new capabilities. In the proposed approach, the behaviour of the IoT botnet samples is captured using a sandbox and represented as behaviour profiles describing the actions performed by the samples. The behaviour profiles are vectorised using TF-IDF and clustered using the DBSCAN algorithm. The proposed approach was evaluated using a collection of samples captured from IoT botnets propagating on the Internet. The evaluation shows that the proposed approach enables accurate automatic identification of IoT botnet variants equipped with new capabilities, which will help security researchers to investigate the new capabilities, and to apply the investigation findings for improving the solutions for detecting and preventing IoT botnet infections.
APA, Harvard, Vancouver, ISO, and other styles
45

Awad Saad Al-Qahtani, Mohammad Ayoub Khan, Awad Saad Al-Qahtani, Mohammad Ayoub Khan. "Predicting Internet of Things (IOT) Security and Privacy Risks – A Proposal Model: توقع مخاطر أمن وخصوصية إنترنت الأشياء (IOT) – نموذج مقترح بحثي." Journal of engineering sciences and information technology 5, no. 3 (September 30, 2021): 133–12. http://dx.doi.org/10.26389/ajsrp.q070621.

Full text
Abstract:
The Internet of things (IOT) users lack awareness of IOT security infrastructure to handle the risks including Threats, attack and penetration associated with its use. IOT devices are main targets for cyber-attacks due to variable personally identifiable information (PII) stored and transmit in the cyber centers. The security risks of the Internet of Things aimed to damage user's security and privacy. All information about users can be collected from their related objects which are stored in the system or transferred through mediums among diverse smart objects and may exposed to exposed dangerous of attacks and threats if it lack authentication so there are essential need to make IOT security requirements as important part of its efficient implementation. These requirements include; availability, accountability, authentication, authorization, privacy and confidentiality, Integrity and Non-repudiation. The study design is a survey research to investigate the visibility of the proposed model of security management for IOT uses, the security risks of IOT devices, and the changes IOT technology on the IT infrastructure of IOT users through answering of the research questionnaires. This work proposes a model of security management for IOT to predict IOT security and privacy threats, protect IOT users from any unforeseen dangers, and determine the right security mechanisms and protocols for IOT security layers, as well as give the most convenient security mechanisms. Moreover, for enhancing the performance of IOT networks by selecting suitable security mechanisms for IOT layers to increase IOT user's security satisfaction.
APA, Harvard, Vancouver, ISO, and other styles
46

Seok, Byoungjin, Jinseong Park, and Jong Hyuk Park. "A Lightweight Hash-Based Blockchain Architecture for Industrial IoT." Applied Sciences 9, no. 18 (September 7, 2019): 3740. http://dx.doi.org/10.3390/app9183740.

Full text
Abstract:
Blockchain is a technology that can ensure data integrity in a distributed network, and it is actively applied in various fields. Recently, blockchain is gaining attention due to combining with the Internet of Things (IoT) technology in the industrial field. Moreover, many researchers have proposed the Industrial IoT (IIoT) architecture with blockchain for data integrity and efficient management. The IIoT network consists of many heterogeneous devices (e.g., sensors, actuators, and programmable logic controllers (PLC)) with resources-constrained, and the availability of the network must be preferentially considered. Therefore, applying the existed blockchain technology is still challenging. There are some results about the technique of constructing blockchain lightly to solve this challenge. However, in these results, the analysis in perspective of cryptographic performance (area, throughput, and power consumption) has not been considered sufficiently, or only focused on the architecture of the blockchain network. The blockchain technology is based on cryptographic techniques, and the main part is a cryptographic hash function. Therefore, if we construct the blockchain-based IIoT architecture, we have to consider the performance of the hash function. Many lightweight hash functions have been proposed recently for the resource-constrained environment, and it can also be used to the blockchain. Therefore, in this paper, we analyze the considerations of lightweight blockchain for IIoT. Also, we conduct an analysis of lightweight hash for blockchain, and propose a new lightweight hash-based blockchain architecture that can change the hash algorithm used for mining adjust to network traffic.
APA, Harvard, Vancouver, ISO, and other styles
47

Khandait, Dr Mrs S. P., Bidisha Basak, Manjiri Kaste, Ashwini Waghmare, Siddhi Dhole, and Kajal Burade. "Smart Parking Solution for Smart Cities Using Arduino." International Journal for Research in Applied Science and Engineering Technology 10, no. 5 (May 31, 2022): 775–86. http://dx.doi.org/10.22214/ijraset.2022.41952.

Full text
Abstract:
Abstract: Today’s world peoples are focusing more on internet. People are becoming dependent on internet as it makes our life easier and faster. In order to maximize the performance and accuracy of the urban area economic-development constant efforts are made in the field of IoT. With the help of IoT platforms we can connect the sensors with the internet. Therefore by using IoT we can implement many applications. The smart parking system is one of this IoT application. There are many problems regarding unplanned parking not only in India but also in many other countries of the world. Hence, we have Introduced IoT based parking system to reduce the issue of unplanned parking and also to reduced the traffic congestion. This project allow the user to find the vacant parking space in a given area. We have developed mobile application using which the user can easily check the availability of parking slot. Keywords: Arduino UNO, IoT, Ultrasonic Sensors, Wifi, Android Application
APA, Harvard, Vancouver, ISO, and other styles
48

Rababah, Baha, and Rasit Eskicioglu. "Distributed Intelligence Model for IoT Applications Based on Neural Networks." International Journal of Computer Network and Information Security 13, no. 3 (June 8, 2021): 1–14. http://dx.doi.org/10.5815/ijcnis.2021.03.01.

Full text
Abstract:
Increasing the implication of IoT data puts a focus on extracting the knowledge from sensors’ raw data. The management of sensors’ data is inefficient with current solutions, as studies have generally focused on either providing cloud-based IoT solutions or inefficient predefined rules. Cloud-based IoT solutions have problems with latency, availability, security and privacy, and power consumption. Therefore, Providing IoT gateways with relevant intelligence is essential for gaining knowledge from raw data to make the decision of whether to actuate or offload tasks to the cloud. This work proposes a model that provides an IoT gateway with the intelligence needed to extract the knowledge from sensors’ data in order to make the decision locally without needing to send all raw data to the cloud over the Internet. This speeds up decisions and actions for real-time data and overcomes the limitations of cloud-based IoT solutions. When the gateway is unable to process a task locally, the data and task are offloaded to the cloud.
APA, Harvard, Vancouver, ISO, and other styles
49

R, Anuvidhya. "RANFO: An Intelligent Anomaly Detection in IoT Edge Devices." International Journal for Research in Applied Science and Engineering Technology 9, no. VI (June 30, 2021): 2900–2907. http://dx.doi.org/10.22214/ijraset.2021.35622.

Full text
Abstract:
As devices, applications, and communication networks become more connected and integrated, computer attacks on the Internet of Things (IoT) become more sophisticated. When attacks on IoT networks cause long-term outages, it affects the availability of critical end-user programmers, increases the number of data breaches and fraud, raises prices, and reduces revenue. In this paper we present the RANFO (IDS), prepared to protect inherently linked Iot systems. The proposed entry-level system can successfully enter real-world entrance, according to our experimental results. We'll illustrate how RANFO can identify a variety of harmful assaults, including DOS, R2L, Probe, and U2L.
APA, Harvard, Vancouver, ISO, and other styles
50

Kakarash, Zana Azeez, and Farhad Mardukhi. "A Review of Properties and Functions of Narrow Band Internet of Things and its Security Requirements." UHD Journal of Science and Technology 4, no. 1 (March 22, 2020): 71. http://dx.doi.org/10.21928/uhdjst.v4n1y2020.pp71-80.

Full text
Abstract:
IOT is a new web sample based on the fact that there are many things and entities other than humans that can connect to the Internet. This fact means that machines or things can automatically interconnected without the need of interacting with humans and thus become the most important entities that create Internet data. In this article, we first examine the challenges of IOT. Then we introduce features of NB- IOT through browsing current international studies on NB- IOT technology in which, we focus on basic theories and key technologies , such as the connection number analysis theory, the theory of delay analysis, the coating increase mechanism , low energy consumption technology, and the connection of the relationship between signaling and data .Then we compare some functions of NB- IOT and other wireless telecommunication technologies in terms of latency, security, availability, data transfer speed, energy consumption, spectral efficiency, and coverage area . Finally, we review and summarize NB- IOT security requirements that should be solved immediately. These topics are provided to overview NB- IOT which can offer a complete familiarity with this area.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography