Journal articles on the topic 'IOTU'

To see the other types of publications on this topic, follow the link: IOTU.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'IOTU.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Osman, Radwa Ahmed, Sherine Nagy Saleh, and Yasmine N. M. Saleh. "A Novel Interference Avoidance Based on a Distributed Deep Learning Model for 5G-Enabled IoT." Sensors 21, no. 19 (September 30, 2021): 6555. http://dx.doi.org/10.3390/s21196555.

Full text
Abstract:
The co-existence of fifth-generation (5G) and Internet-of-Things (IoT) has become inevitable in many applications since 5G networks have created steadier connections and operate more reliably, which is extremely important for IoT communication. During transmission, IoT devices (IoTDs) communicate with IoT Gateway (IoTG), whereas in 5G networks, cellular users equipment (CUE) may communicate with any destination (D) whether it is a base station (BS) or other CUE, which is known as device-to-device (D2D) communication. One of the challenges that face 5G and IoT is interference. Interference may exist at BSs, CUE receivers, and IoTGs due to the sharing of the same spectrum. This paper proposes an interference avoidance distributed deep learning model for IoT and device to any destination communication by learning from data generated by the Lagrange optimization technique to predict the optimum IoTD-D, CUE-IoTG, BS-IoTD and IoTG-CUE distances for uplink and downlink data communication, thus achieving higher overall system throughput and energy efficiency. The proposed model was compared to state-of-the-art regression benchmarks, which provided a huge improvement in terms of mean absolute error and root mean squared error. Both analytical and deep learning models reached the optimal throughput and energy efficiency while suppressing interference to any destination and IoTG.
APA, Harvard, Vancouver, ISO, and other styles
2

Ullah, Ikram, Gerard de Roode, Nirvana Meratnia, and Paul Havinga. "Threat Modeling—How to Visualize Attacks on IOTA?" Sensors 21, no. 5 (March 6, 2021): 1834. http://dx.doi.org/10.3390/s21051834.

Full text
Abstract:
Internet of Things (IoT) has been deployed in a vast number of smart applications with the aim to bring ease and comfort into our lives. However, with the expansion of IoT applications, the number of security and privacy breaches has also increased, which brings into question the resilience of existing security and trust mechanisms. Furthermore, the contemporaneous centralized technology is posing significant challenges viz scalability, transparency and efficiency to wide range of IoT applications such as smart logistics, where millions of IoT devices need to be connected simultaneously. Alternatively, IOTA is a distributed ledger technology that offers resilient security and trust mechanisms and a decentralized architecture to overcome IoT impediments. IOTA has already been implemented in many applications and has clearly demonstrated its significance in real-world applications. Like any other technology, IOTA unfortunately also encounters security vulnerabilities. The purpose of this study is to explore and highlight security vulnerabilities of IOTA and simultaneously demonstrate the value of threat modeling in evaluating security vulnerabilities of distributed ledger technology. IOTA vulnerabilities are scrutinized in terms of feasibility and impact and we have also presented prevention techniques where applicable. To identify IOTA vulnerabilities, we have examined existing literature and online blogs. Literature available on this topic is very limited so far. As far as we know IOTA has barely been addressed in the traditional journals, conferences and books. In total we have identified six vulnerabilities. We used Common Vulnerability Scoring System (CVSS v3.0) to further categorize these vulnerabilities on the basis of their feasibility and impact.
APA, Harvard, Vancouver, ISO, and other styles
3

Jain, Shelendra Kumar, and Nishtha Kesswani. "IoTP an Efficient Privacy Preserving Scheme for Internet of Things Environment." International Journal of Information Security and Privacy 14, no. 2 (April 2020): 116–42. http://dx.doi.org/10.4018/ijisp.2020040107.

Full text
Abstract:
Many emerging fields are adopting Internet of Things technologies to incorporate smartness in respective areas. Several IoT based application area produces large volumes of real time data. Data aggregated through sensor nodes may contain highly sensitive information. An effective and successful IoT system must protect sensitive data from revealing to unauthorized persons. In this article, the authors present an efficient privacy-preserving mechanism called Internet of Things privacy (IoTp). The research simulates and analyzes the effectiveness of the proposed data aggregation and data access mechanism for a typical IoT system. Proposed IoTp scheme ensures privacy at data collection, data store and data access phases of the IoT system. The authors have compared proposed work with existing model. Results show that IoTp scheme is efficient and lightweight mechanism for data collection and data access. It is suitable for the resource constrained IoT ecosystems.
APA, Harvard, Vancouver, ISO, and other styles
4

Li, Junsheng, Wenyuan Ren, Aijun Zhang, Shuangcun Li, Jianping Tan, and Hongtai Liu. "Mechanical Properties and Microstructure Analysis of Cement Mortar Mixed with Iron Ore Tailings." Buildings 13, no. 1 (January 6, 2023): 149. http://dx.doi.org/10.3390/buildings13010149.

Full text
Abstract:
In order to study the feasibility and sand substitution mechanism of cement mortar mixed with iron ore tailings (IOT), iron ore tailings cement mortars (referred to as IOTC) with IOT content of 0%, 25%, and 50% were made and tested. First, the basic properties of IOT used were measured to verify the theoretical feasibility. Second, the uniaxial compressive and tensile strengths, as well as the crack resistance performance of IOTC under different curing ages and different sand substitution rates were tested. Third, the techniques of inductively coupled plasma atomic emission spectrometry (ICP-OES), X-ray diffraction (XRD), nuclear magnetic resonance (NMR), scanning electron microscopy and energy-dispersive spectroscopy (SEM-EDS) were used to study the influence of curing age and different sand substitution rates on the chemical, mineralogical, and microstructural characteristics of IOTC. The sand substitution mechanism of IOT was then discussed. The research results proved the feasibility of using IOT to substitute standard sand in cement mortar. Within substitution rate of 0–50%, the mechanical properties increased with the increase of substitution rate. Though limited chemical effects were found by adding IOT, in comparison with standard sand mortar, more hydration products were found and the pore size distribution was changed for IOTC, which corresponds to its mechanical improvement.
APA, Harvard, Vancouver, ISO, and other styles
5

Rawat, Abhimanyu, Vanesa Daza, and Matteo Signorini. "Offline Scaling of IoT Devices in IOTA Blockchain." Sensors 22, no. 4 (February 12, 2022): 1411. http://dx.doi.org/10.3390/s22041411.

Full text
Abstract:
An increased pattern of hidden Internet of Things (IoT) devices has been observed. Due to the increased number of security attacks, a large number of IoT devices are disappearing from the public internet. Operating blockchain operations in such ad hoc connectivity becomes challenging. However, multiple past studies have pointed towards IOTA Distributed Ledger Technology (DLT) that closely caters to offline blockchain use cases. However, there has been little to no empirical study or introduction to time bounds on transaction confirmation. Therefore, this study explains what provisions the existing IOTA blockchain has to accommodate the increased pattern of hidden IoT devices, and if IOTA is truly sufficient as a solution. In summary, we approach research questions by analyzing the studies that explore the trend of offline IoT devices and evaluating the relevance of offline blockchains, assessing the IOTA specification and codebase around offline transaction-making capabilities and pointing out some bounds that IOTA blockchain nodes must follow towards incoming transactions. Furthermore, we confirm by experimental runs that outside and within the tight time bounds transactions in offline Tangle can become stale and not get confirmed, and the effective time-bound can be even less. Realizing the need for a better offline blockchain scalability solution.
APA, Harvard, Vancouver, ISO, and other styles
6

Partida, Alberto, Regino Criado, and Miguel Romance. "Visibility Graph Analysis of IOTA and IoTeX Price Series: An Intentional Risk-Based Strategy to Use 5G for IoT." Electronics 10, no. 18 (September 17, 2021): 2282. http://dx.doi.org/10.3390/electronics10182282.

Full text
Abstract:
The transformation of time series into complex networks through visibility graphs is an innovative way to study time-based events. In this work, we use visibility graphs to transform IOTA and IoTeX price volatility time series into complex networks. Our aim is twofold: first, to better understand the markets of the two most capitalised Internet of Things (IoT) platforms at the time of writing. IOTA runs on a public directed acyclic graph (DAG) and IoTeX on a blockchain. Second, to suggest how 5G can improve information security in these two key IoT platforms. The analysis of the networks created by the natural and horizontal visibility graphs shows, first, that both IOTA and IoTeX are still at their infancy in their development, with IoTex seemingly developing faster. Second, both IoT tokens form communities in a hierarchical structure, and third, 5G can accelerate their development. We use intentional risk management as a lever to understand the impact of 5G on IOTA and IoTeX. Our results lead us to provide a set of design recommendations that contribute to improving information security in future 5G-based IoT implementations.
APA, Harvard, Vancouver, ISO, and other styles
7

K. M, Delphin Raj, Jinyoung Lee, Eunbi Ko, Soo-Young Shin, Jung-Il Namgung, Sun-Ho Yum, and Soo-Hyun Park. "Underwater Network Management System in Internet of Underwater Things: Open Challenges, Benefits, and Feasible Solution." Electronics 9, no. 7 (July 14, 2020): 1142. http://dx.doi.org/10.3390/electronics9071142.

Full text
Abstract:
As oceans cover the majority of the earth’s surface, it becomes inevitable in extending the concepts of Internet of Things (IoT) to ocean bodies, thereby tiling the way for a new drift in the digital world, the Internet of Underwater Things (IoUT). The primary objective of IoUT is the creation of a network of several smart interconnected undersea things, to digitally link water bodies by using devices such as autonomous underwater vehicles. Since the traditional ideas of IoT cannot be merely expanded to underwater, due to the difference in environmental characteristics, this puts forward a variety of challenges for scientists to work with IoUT, and one such challenge is the network management with IoUT. This paper gives an overview on (1) underwater network management systems (U-NMS) using acoustic communication in IoUT; (2) the challenges and benefits and use cases of U-NMS; (3) fault, configuration, accounting, performance, security and constrained management (FCAPSC) functionalities of U-NMS and (4) a comparison between network management system in IoT and U-NMS system in IoUT. Additionally, this paper shows the prototype design and implementation setup of U-NMS in a laboratory environment, using lightweight machine to machine (LWM2M) and acoustic communication technology for IoUT. This paper will contribute much to the profit of researchers and industry players in uncovering the critical areas of the Internet of Underwater Things.
APA, Harvard, Vancouver, ISO, and other styles
8

Liu, Qian, Qingguo Tang, Weiwei Zhao, Zhiyuan Su, Cong Liang, Xinhui Duan, and Jinsheng Liang. "Ultrafine Grinded and Silane Grafted Iron Ore Tailings as Reinforcing Filler of Styrene Butadiene Rubber." Materials 15, no. 5 (February 25, 2022): 1756. http://dx.doi.org/10.3390/ma15051756.

Full text
Abstract:
In order to realize the high value-added resource utilization of solid waste and reduce the cost of rubber manufacturing, iron ore tailings (IOTs) were used as raw material to prepare a reinforcing filler of rubber through ultrafine grinding and surface organic modification techniques. We studied the effects of ball mill grinding conditions on the particle size and distribution of grinded iron ore tailings (G-IOTs). The effects of bis-(triethoxy-silyl-propyl)-tetrasulfide (Si69)-modified G-IOT (Si69-G-IOT) loading levels on the cure characteristics, static mechanical and dynamic mechanical properties of the styrene butadiene rubber (SBR) composites were also explored in this paper. The grinding and modification mechanism of IOTs and the combination of filler and SBR matrix were explored by grinding simulation of population balance model, X-ray diffraction analysis, Fourier transform infrared spectroscopy and scanning electron microscopy. The results showed that when grinding IOTs at 2000 r/min for 150 min, the particle size distribution of the resulting G-IOTs was the narrowest, with a D90 value of 4.42 μm. The tensile strength and elongation at break of SBR filled with 120 phr Si69-G-IOT were 14.97 MPa and 596.36%, respectively.
APA, Harvard, Vancouver, ISO, and other styles
9

Zhang, Yuanyu, Ruka Nakanishi, Masahiro Sasabe, and Shoji Kasahara. "Combining IOTA and Attribute-Based Encryption for Access Control in the Internet of Things." Sensors 21, no. 15 (July 26, 2021): 5053. http://dx.doi.org/10.3390/s21155053.

Full text
Abstract:
Unauthorized resource access represents a typical security threat in the Internet of Things (IoT), while distributed ledger technologies (e.g., blockchain and IOTA) hold great promise to address this threat. Although blockchain-based IoT access control schemes have been the most popular ones, they suffer from several significant limitations, such as high monetary cost and low throughput of processing access requests. To overcome these limitations, this paper proposes a novel IoT access control scheme by combining the fee-less IOTA technology and the Ciphertext-Policy Attribute-Based Encryption (CP-ABE) technology. To control the access to a resource, a token, which records access permissions to this resource, is encrypted by the CP-ABE technology and uploaded to the IOTA Tangle (i.e., the underlying database of IOTA). Any user can fetch the encrypted token from the Tangle, while only those who can decrypt this token are authorized to access the resource. In this way, the proposed scheme enables not only distributed, fee-less and scalable access control thanks to the IOTA but also fine-grained attribute-based access control thanks to the CP-ABE. We show the feasibility of our scheme by implementing a proof-of-concept prototype system using smart phones (Google Pixel 3XL) and a commercial IoT gateway (NEC EGW001). We also evaluate the performance of the proposed scheme in terms of access request processing throughput. The experimental results show that our scheme enables object owners to authorize access rights to a large number of subjects in a much (about 5 times) shorter time than the existing access control scheme called Decentralized Capability-based Access Control framework using IOTA (DCACI), significantly improving the access request processing throughput.
APA, Harvard, Vancouver, ISO, and other styles
10

Ahmed Osman, Radwa, and Amira I. Zaki. "Energy-Efficient and Reliable Internet of Things for 5G: A Framework for Interference Control." Electronics 9, no. 12 (December 17, 2020): 2165. http://dx.doi.org/10.3390/electronics9122165.

Full text
Abstract:
The Internet of Things (IoT) is one of the promising paradigms that enable massive machines and devices to communicate with each other in future communication networks to promote a high level of awareness about our world and improve our daily life. IoT devices (IoTDs) communicate with an IoT base station (IoTBS) or IoT gateway (IoTG) by sharing the resources of other cellular users (CUEs). Due to the leakage of the spectral efficiency, interference exists among IoTG and base station (BS) due to CUEs and IoTDs. In this paper, a new framework is proposed called the interference control model. This proposed model aims to control the interference among IoTG and BS and is based on using the Lagrange optimization technique to reduce interference and maximize the energy efficiency and reliability of the IoT and cellular networks in fifth-generation (5G) systems. First, we formulate the multi-objective optimization problem to achieve the objective of the proposed model. Then, based on the optimization strategy, we derive the closed-form expressions of key quality-of-service (QoS) performance such as system reliability, throughput, and energy efficiency. Finally, the proposed algorithm has been evaluated and examined through different assumptions and several simulation scenarios. The obtained results validate the effectiveness and the accuracy of our proposed idea and also indicate significant improvement in the network performance of IoT and cellular networks.
APA, Harvard, Vancouver, ISO, and other styles
11

Bala Murugan, C., and S. Koteeswaran. "Emprical Study of Iot Solution for The Security Threats In Real Life Scenario: State of The Art." International Journal of Engineering & Technology 7, no. 2.19 (April 17, 2018): 26. http://dx.doi.org/10.14419/ijet.v7i2.19.13792.

Full text
Abstract:
IoT technology and applications represents security as a significant issue for facilitating the tremendous implementation. Devoid of IoTs technology ensures the device level confidentiality, privacy and authenticity. The applicable users are not going to undertake answers for security in IoT in huge scale. The earlier stage deployments of IoT devices are primarily based on RFIDs technology which results in simplest, security solutions inside the principal been devised in an advert hoc manner [8]. This brings the fact that such deployments were typically vertically incorporated, with all additives beneath the manage of a single administrative entity. In the angle of an IoT eco-system, in which unique person may be worried in a given software state of affairs. One person owing the physical operations of sensors, one stakeholder deals with the statistics and processing them and other numerous stakeholders supplies different services based totally on such statistics to the customers. This leads to numerous variety of safety demanding situations and security for the IoT. In this paper, we address the revisited security issues and discuss the critical safety protection conditions of Internet of Things era into a mainstream. To support this, the three key problems requiring cutting-edge techniques includes are data confidentiality, privacy and trust.In this review, we presented net factors with architectural design goals of IoT. We surveyed security and privacy issues in IoTs. Also the discussion on several open issues based on the privacy and security is addressed. Many real time applications of IoTs in real life treats the security issues of IoT as a main factor. Thus the IoT of complicated security issues have been anticipated the researchers to address.
APA, Harvard, Vancouver, ISO, and other styles
12

Cano, Sandra, Victor Peñeñory, César A. Collazos, and Sergio Albiol-Pérez. "Designing Internet of Tangible Things for Children with Hearing Impairment." Information 11, no. 2 (January 28, 2020): 70. http://dx.doi.org/10.3390/info11020070.

Full text
Abstract:
Tangible User Interfaces (TUIs) are a new, non-traditional way to interact with digital information using a physical environment. Therefore, TUIs connect a physical set of objects that can be explored and manipulated. TUI can be interconnected over the Internet, using Internet of Things (IoT) technology to monitor a child’s activities in real-time. Internet of Tangible Things (IoTT) is defined as a tangible interaction applied to IoT. This article describes four case studies that apply IoTT to children with cochlear implants and children whose communication is sign language. For each case study, a discussion is presented, discussing how IoTT can help the child development in skills such as: social, emotional, psychomotor, cognitive, and visual. It was found that IoTT works best when it includes the social component in children with hearing impairment, because it helps them to communicate with each other and build social-emotional skills.
APA, Harvard, Vancouver, ISO, and other styles
13

Kimbugwe, Nasser, Tingrui Pei, and Moses Ntanda Kyebambe. "Application of Deep Learning for Quality of Service Enhancement in Internet of Things: A Review." Energies 14, no. 19 (October 6, 2021): 6384. http://dx.doi.org/10.3390/en14196384.

Full text
Abstract:
The role of the Internet of Things (IoT) networks and systems in our daily life cannot be underestimated. IoT is among the fastest evolving innovative technologies that are digitizing and interconnecting many domains. Most life-critical and finance-critical systems are now IoT-based. It is, therefore, paramount that the Quality of Service (QoS) of IoTs is guaranteed. Traditionally, IoTs use heuristic, game theory approaches and optimization techniques for QoS guarantee. However, these methods and approaches have challenges whenever the number of users and devices increases or when multicellular situations are considered. Moreover, IoTs receive and generate huge amounts of data that cannot be effectively handled by the traditional methods for QoS assurance, especially in extracting useful features from this data. Deep Learning (DL) approaches have been suggested as a potential candidate in solving and handling the above-mentioned challenges in order to enhance and guarantee QoS in IoT. In this paper, we provide an extensive review of how DL techniques have been applied to enhance QoS in IoT. From the papers reviewed, we note that QoS in IoT-based systems is breached when the security and privacy of the systems are compromised or when the IoT resources are not properly managed. Therefore, this paper aims at finding out how Deep Learning has been applied to enhance QoS in IoT by preventing security and privacy breaches of the IoT-based systems and ensuring the proper and efficient allocation and management of IoT resources. We identify Deep Learning models and technologies described in state-of-the-art research and review papers and identify those that are most used in handling IoT QoS issues. We provide a detailed explanation of QoS in IoT and an overview of commonly used DL-based algorithms in enhancing QoS. Then, we provide a comprehensive discussion of how various DL techniques have been applied for enhancing QoS. We conclude the paper by highlighting the emerging areas of research around Deep Learning and its applicability in IoT QoS enhancement, future trends, and the associated challenges in the application of Deep Learning for QoS in IoT.
APA, Harvard, Vancouver, ISO, and other styles
14

Kumar, Ranjit, Rahul Gupta, and Sunil Kumar. "IoT Security on Smart Grid: Threats and Mitigation Frameworks." ECS Transactions 107, no. 1 (April 24, 2022): 14623–30. http://dx.doi.org/10.1149/10701.14623ecst.

Full text
Abstract:
The number of smart grid IoTs is expected to grow exponentially in the near future, as predicted by the analyst. The improvement of a smart grid IoT security system increases due to communication technologies used in traditional power systems. Smart grid IoTs include critical devices due to its complex architectures. Smart grid IoTs that are connected and controlled remotely through the internet are becoming more universal. As a result, homes and businesses have ever increasing attack surfaces on their networks. It can lead to security arrears, and large-scale economic damage when the confidentiality and integrity of the communication is broken down. These huge systems may be endangered to threats. Consequently, there is a lot of research effort to enhance smart grid security in government, industry, and academia. We present a broad survey supported by a thorough review of earlier work. Moreover, recent advances and corrective measures are presented on smart grid IoT security. In this paper, the threats and mitigation framework of the smart grid IoT are analyzed. This paper reviews the existing literature on the smart grid IoTs in energy systems. We focus on threat types and provide an in-depth discussion of the threat state of the smart grid. Explicitly, we focus on the discussion and scrutiny of network vulnerabilities, attack countermeasures, and security requirements. We focus to supply a deep understanding of threat vulnerabilities and mitigation framework and give a path on future research directions for threat in smart grid IoTs.
APA, Harvard, Vancouver, ISO, and other styles
15

Akhtar, Mohd Majid, Danish Raza Rizvi, Mohd Abdul Ahad, Salil S. Kanhere, Mohammad Amjad, and Giuseppe Coviello. "Efficient Data Communication Using Distributed Ledger Technology and IOTA-Enabled Internet of Things for a Future Machine-to-Machine Economy." Sensors 21, no. 13 (June 25, 2021): 4354. http://dx.doi.org/10.3390/s21134354.

Full text
Abstract:
A potential rise in interest in the Internet of Things in the upcoming years is expected in the fields of healthcare, supply chain, logistics, industries, smart cities, smart homes, cyber physical systems, etc. This paper discloses the fusion of the Internet of Things (IoT) with the so-called “distributed ledger technology” (DLT). IoT sensors like temperature sensors, motion sensors, GPS or connected devices convey the activity of the environment. Sensor information acquired by such IoT devices are then stored in a blockchain. Data on a blockchain remains immutable however its scalability still remains a challenging issue and thus represents a hindrance for its mass adoption in the IoT. Here a communication system based on IOTA and DLT is discussed with a systematic architecture for IoT devices and a future machine-to-machine (M2M) economy. The data communication between IoT devices is analyzed using multiple use cases such as sending DHT-11 sensor data to the IOTA tangle. The value communication is analyzed using a novel “micro-payment enabled over the top” (MP-OTT) streaming platform that is based on the “pay-as-you-go” and “consumption based” models to showcase IOTA value transactions. In this paper, we propose an enhancement to the classical “masked authenticated message” (MAM) communication protocol and two architectures called dual signature masked authenticated message (DSMAM) and index-based address value transaction (IBAVT). Further, we provided an empirical analysis and discussion of the proposed techniques. The implemented solution provides better address management with secured sharing and communication of IoT data, complete access control over the ownership of data and high scalability in terms of number of transactions that can be handled.
APA, Harvard, Vancouver, ISO, and other styles
16

Song, Junsup, Dimitris Karagiannis, and Moonkun Lee. "Modeling Method to Abstract Collective Behavior of Smart IoT Systems in CPS." Sensors 22, no. 13 (July 5, 2022): 5057. http://dx.doi.org/10.3390/s22135057.

Full text
Abstract:
This paper presents a new modeling method to abstract the collective behavior of Smart IoT Systems in CPS, based on process algebra and a lattice structure. In general, process algebra is known to be one of the best formal methods to model IoTs, since each IoT can be represented as a process; a lattice can also be considered one of the best mathematical structures to abstract the collective behavior of IoTs since it has the hierarchical structure to represent multi-dimensional aspects of the interactions of IoTs. The dual approach using two mathematical structures is very challenging since the process algebra have to provide an expressive power to describe the smart behavior of IoTs, and the lattice has to provide an operational capability to handle the state-explosion problem generated from the interactions of IoTs. For these purposes, this paper presents a process algebra, called dTP-Calculus, which represents the smart behavior of IoTs with non-deterministic choice operation based on probability, and a lattice, called n:2-Lattice, which has special join and meet operations to handle the state explosion problem. The main advantage of the method is that the lattice can represent all the possible behavior of the IoT systems, and the patterns of behavior can be elaborated by finding the traces of the behavior in the lattice. Another main advantage is that the new notion of equivalences can be defined within n:2-Lattice, which can be used to solve the classical problem of exponential and non-deterministic complexity in the equivalences of Norm Chomsky and Robin Milner by abstracting them into polynomial and static complexity in the lattice. In order to prove the concept of the method, two tools are developed based on the ADOxx Meta-Modeling Platform: SAVE for the dTP-Calculus and PRISM for the n:2-Lattice. The method and tools can be considered one of the most challenging research topics in the area of modeling to represent the collective behavior of Smart IoT Systems.
APA, Harvard, Vancouver, ISO, and other styles
17

Purohit, Santanu. "Technological transition from analog to internet of things ( IoT ) on Indian petro-retail’s customer service." Indian Journal of Science and Technology 13, no. 42 (November 14, 2020): 4364–68. http://dx.doi.org/10.17485/ijst/v13i42.1964.

Full text
Abstract:
Objectives: To identify the gap in the adaptation of IoTs towards meeting the customer expectation for services in petro-retailing in India. Method: Review of available published research articles, case studies, published article in journals and websites on uses of IOTs in various sectors like retail, telecom manufacturing, supply chain management, oil & gas etc. Findings: Technological advances have had a significant impact on both consumers as well as industries. While internet changed the way human interact, Internet of Things (IoT) is expected to change the way machines interact. Adding a networked layer to regular objects has transformed the way we use and interact with them. Industries like healthcare, manufacturing, telecom, etc have seen significant changes with the introduction of IoT. Oil & Gas industry has also seen implementation of IoT but the adoption has varied according to sector. Upstream sector, involved in exploration and drilling, has seen significant adoption while Mid-stream sector, involved in transport and storage, has seen only specific application. IoT solutions have been used for cost optimization as well as improved operations management. Downstream sector (including refining and retail) has seen only limited adoption. Novelty: IoTs are the technology on which future society is going to ride. The use of IoT is going to have huge impact in service industry including petro retailing. Hence the analysis of gap in adaptation shall be helpful for the academician’s, managers in Oil & Gas industry for further review, study and implementation. Keywords: Internet of Things; Indian fuel retail; IOT in oil & gas; new technology adoption; customer experience
APA, Harvard, Vancouver, ISO, and other styles
18

Wang, Fanhua, and Jiangli Qu. "Remote Monitoring System Based on Artificial Intelligence Technology." Journal of Physics: Conference Series 2146, no. 1 (January 1, 2022): 012039. http://dx.doi.org/10.1088/1742-6596/2146/1/012039.

Full text
Abstract:
Abstract With the advent of the information age, IOTT has been favored by many industries and has become another profound revolution in the IT industry. In such an era, the application of IOTT in IB construction can broaden the practicability of intelligent system, ORA, improve the management and service ability of IB, so as to improve people’s quality of life. This paper expounds the development status and future challenges of IOTH, and analyzes the interactive design of smart TV.
APA, Harvard, Vancouver, ISO, and other styles
19

Nittayathammakul, Vitsanu, Pinanta Chatwattana, and Pallop Piriyasurawong. "Crowd Context-Based Learning Process via IoT Wearable Technology to Promote Digital Health Literacy." International Education Studies 15, no. 6 (November 21, 2022): 27. http://dx.doi.org/10.5539/ies.v15n6p27.

Full text
Abstract:
The crowd context-based learning process via IoT wearable technology [IoTW-driven Crowd context-based learning (CCBL)] is a new learning paradigm that integrates Technological Cybergogical Content Knowledge (TCACK) based on connectivism, cognitive tools and information processing theories to promote digital health literacy. In this study, the IoTW-driven CCBL was designed by incorporating content, cybergogical, and technological elements, which can become a sustainable solution in educational settings during the global COVID-19 pandemic. The researchers collected qualitative data by confirmatory focus groups from 12 experts who hold doctoral degrees or equivalent and have at least 3 years of relevant experience. The results of these studies found that the IoTW-driven CCBL involves three specific learning contents (healthcare, disease prevention and health promotion); five dynamic learning steps (context-aware alerting step; observing and questioning step; social information-seeking step; action step; and self-reflection step as all cognitive tools embedded in IoTW devices help promote all digital health literacy components); and four cognitive tools (notification tool; communication tool; searching tool; and monitoring tool). The IoTW-driven CCBL will allow learners to respond to real-life situations by utilising IoT devices to access, apprehend, appraise and apply health information from digital technologies in daily life for well-being, especially in educational settings.
APA, Harvard, Vancouver, ISO, and other styles
20

V. Jog, Vivek, and Senthil Murugan T. "Memory and machine attributes-based profiling and elliptic curve cryptography-based multi-level authentication for the security of Internet of Things." International Journal of Intelligent Computing and Cybernetics 10, no. 2 (June 12, 2017): 241–56. http://dx.doi.org/10.1108/ijicc-08-2016-0030.

Full text
Abstract:
Purpose Due to the connectivity of the multiple devices and the systems on the same network, rapid development has become possible in Internet of Things (IoTs) for the last decade. But, IoT is mostly affected with severe security challenges due to the potential vulnerabilities happened through the multiple connectivity of sensors, devices and system. In order to handle the security challenges, literature presents a handful of security protocols for IoT. The purpose of this paper is to present a threat profiling and elliptic curve cryptography (ECC)-based mutual and multi-level authentication for the security of IoTs. This work contains two security attributes like memory and machine-related attributes for maintaining the profile table. Also, the profile table stores the value after encrypting the value with ECC to avoid storage resilience using the proposed protocol. Furthermore, three entities like, IoT device, server and authorization centre (AC) performs the verification based on seven levels mutually to provide the resilience against most of the widely accepted attacks. Finally, DPWSim is utilized for simulation of IoT and verification of proposed protocol to show that the protocol is secure against passive and active attacks. Design/methodology/approach In this work, the authors have presented a threat profiling and ECC-based mutual and multi-level authentication for the security of IoTs. This work contains two security attributes like memory and machine-related attributes for maintaining the profile table. Also, the profile table stores the value after encrypting the value with ECC to avoid storage resilience using the proposed protocol. Furthermore, three entities like, IoT device, server and AC performs the verification based on seven levels mutually to provide the resilience against most of the widely accepted attacks. Findings DPWSim is utilized for simulation of IoT and verification of the proposed protocol to show that this protocol is secure against passive and active attacks. Also, attack analysis is carried out to prove the robustness of the proposed protocol against the password guessing attack, impersonation attack, server spoofing attack, stolen verifier attack and reply attack. Originality/value This paper presents a threat profiling and ECC-based mutual and multi-level authentication for the security of IoTs.
APA, Harvard, Vancouver, ISO, and other styles
21

Ershov, Yurii S., Naimdzhon M. Ibragimov, and Aleksandr I. Dushenin. "Input-Output Table Regionalization and Multiregional Input-Output Model Development Algorithm." Journal of Siberian Federal University. Humanities & Social Sciences 14, no. 7 (July 2021): 1018–27. http://dx.doi.org/10.17516/1997-1370-0781.

Full text
Abstract:
The main problems of constructing multiregional input-output (IO) models used for the development of spatial and sectoral long-term national economy forecasts are caused by the absence of proper statistics. Therefore, it is necessary to make up the input-output tables (IOTs) based on a limited set of direct and indirect indicators that measure spatial patterns of production, consumption, capital formation, etc., sufficiently accurate for filling up multiregional IO models. The paper discusses Russian IOT spatial mapping problems and proposes an approach to partial automation of the procedures necessary for regional IOT construction (by federal districts). The regionalization was carried out using a static IO model with the bounding sum control. As a result, a set of consistent regional tables for 2015 was developed, with the eight IOT sum equalling Russia’s IOT. Based on the estimated regional IOTs, a static multiregional input-output model (OMIOM) across federal districts for 2015 was made up. The model allows us to proceed to the follow-up phase, i. e., developing a semi-dynamic model for long-term national economic projection computations
APA, Harvard, Vancouver, ISO, and other styles
22

Altameem, Ayman, Prabu P, Senthilnathan T, Ramesh Chandra Poonia, and Abdul Khader Jilani Saudagar. "A Hybrid AES with a Chaotic Map-Based Biometric Authentication Framework for IoT and Industry 4.0." Systems 11, no. 1 (January 5, 2023): 28. http://dx.doi.org/10.3390/systems11010028.

Full text
Abstract:
The Internet of Things (IoT) is being applied in multiple domains, including smart homes and energy management. This work aims to tighten security in IoTs using fingerprint authentications and avoid unauthorized access to systems for safeguarding user privacy. Captured fingerprints can jeopardize the security and privacy of personal information. To solve privacy- and security-related problems in IoT-based environments, Biometric Authentication Frameworks (BAFs) are proposed to enable authentications in IoTs coupled with fingerprint authentications on edge consumer devices and to ensure biometric security in transmissions and databases. The Honeywell Advanced Encryption Security-Cryptography Measure (HAES-CM) scheme combined with Hybrid Advanced Encryption Standards with Chaotic Map Encryptions is proposed. BAFs enable private and secure communications between Industry 4.0’s edge devices and IoT. This work’s suggested scheme’s evaluations with other encryption methods reveal that the suggested HAES-CM encryption strategy outperforms others in terms of processing speeds.
APA, Harvard, Vancouver, ISO, and other styles
23

Alreshidi, Abdulrahman, and Aakash Ahmad. "Architecting Software for the Internet of Thing Based Systems." Future Internet 11, no. 7 (July 10, 2019): 153. http://dx.doi.org/10.3390/fi11070153.

Full text
Abstract:
Context—Internet of Thing (IoT) based systems support any-time/place computations by interconnecting humans, systems, services, devices, and things that enabling autonomous systems to shape-up digitized societies. Software architecture, as the blue-print of software-intensive systems, abstracts the complexities of modeling, design, development, and evolution phases of a software to engineer complex IoT driven systems effectively and efficiently. Objectives and Method—Research and development efforts are required to exploit architectural principle and practices to design and develop IoT systems to go beyond the state-of-the-art for IoTs. The objectives of this research are to empirically investigate and systematically classify the state-of-the-art on architecting IoT based software. We have used the Evidence Based Software Engineering (EBSE) method to conduct a mapping study of the existing IoT solutions by investigating 88 qualitatively selected studies. Results and Implications—The results of the mapping study highlight various research themes that exploit software architecture models to develop IoT systems. The identified research themes include, but are not limited to, cloud-based software ecosystems, software defined networking, autonomous, and adaptive software and agent-based systems that IoTs drive. The mapping study suggests that futuristic research on architecting IoT software is focused on architectural languages and patterns that support reusability, automation, and human decision support to develop and dynamically adapt IoT software. The mapping study represents a concentrated knowledge regarding architectural principle and practices to facilitate knowledge transfer—benefiting researchers and practitioners—on the role of software architecture for IoT systems.
APA, Harvard, Vancouver, ISO, and other styles
24

Valmohammadi, Changiz. "Examining the perception of Iranian organizations on Internet of Things solutions and applications." Industrial and Commercial Training 48, no. 2 (February 1, 2016): 104–8. http://dx.doi.org/10.1108/ict-07-2015-0045.

Full text
Abstract:
Purpose – The purpose of this paper is to explore the perception of Iranian experts and executive managers of sample organizations on the benefits and barriers of Internet of Things (IoT) solutions implementation. Based on the context of Iran using descriptive analysis. Design/methodology/approach – Based on the review of the related literature and websites, benefits and barriers of successful implementation to IoTs solutions were identified. Through a self-administered questionnaire which was collected from 67 Iranian organizations the ranking and importance of benefits and barriers of IoTs solutions implementation were determined based on the perception of the experts of the surveyed organizations. Findings – Analysis of data and the obtained results reveals that “improved customer experience” and “Supply chain optimization and responsiveness” are the most important benefits that the survey organizations expect to reap as a result of IoTs solutions implementation. Also “Integration challenges” and “cannot find right suppliers” were ranked as the most challenging barriers to IoTs solutions implementation. Research limitations/implications – The findings and conclusions drawn from this research are representative of the Iranian context only. So, caution needs to be exercised in generalizing the results. Practical implications – The top management of Iranian organizations and also, policy makers of the country should be aware that IoTs solutions are being deployed rapidly throughout the globe. Therefore, it is necessary to increase investment in IT infrastructure and also by holding various training for employees and experts of Iranian organizations, and setting various IoT majors in the country’s universities and vocational schools, efforts should be made to accelerate the deployment of IoTs solutions to keep pace with leading companies in the world. Originality/value – As IoTs is rather a new phenomenon in the Iranian industries this study has the potential to enhance the understanding of IoTs solutions and applications, benefits and barriers amongst researches and practitioners in the context of Iran. Also policymakers of the country could take advantage of the findings of this study toward a successful implementation of IoTs solutions and applications.
APA, Harvard, Vancouver, ISO, and other styles
25

Ahamed, N. Nasurudeen, and R. Vignesh. "A Blockchain IoT (BIoT) Integrated into Futuristic Networking for Industry." International Journal of Mathematical, Engineering and Management Sciences 7, no. 4 (July 17, 2022): 524–46. http://dx.doi.org/10.33889/ijmems.2022.7.4.034.

Full text
Abstract:
Blockchain innovation is the most confided in across the board cryptosystem that gives a structure to getting exchanges over networks because of its irreversibility and permanence attributes. Blockchain organization, as a decentralized framework, has drawn the consideration of different new companies, managers, and designers. Web of Things (IoT) has been the primary empowering agent of the transformation. Hence, blockchain can fill in as a decent establishment for applications dependent on exchanges and cooperation. IoT executions and purpose are by describe disseminated. This implies blockchain can assist with settling a large portion of the defense weaknesses and detectability worries of IoTs by utilizing blockchain as a record that can monitor how gadgets cooperate, in which state they are and how they execute with other IoT gadgets. IoT relevance has been primarily carried out with advancements in Container Deployment Method (Docker). Blockchain IoT (BIoT) applications are additionally investigated, and a few important answers for work on the adaptability and throughput of such applications are proposed. blockchain and IoT must address for them to effectively cooperate. We have distinguished the central issues where blockchain innovation can help further develop IoT applications. An assessment has likewise been given to demonstrate the attainability of utilizing blockchain hubs on IoT gadgets. This paper section furnishes mixed plans surveys and observes structures for BIoT applications. Blockchain can provide a decent establishment for operations dependent on exchanges and collaborations. IoT executions and functions are by definition circulated. This implies blockchain can assist with tackling the vast majority of the care, weaknesses, and discernibility worries of IoTs by utilizing blockchain as a record that can monitor how gadgets collaborate, and in which way to execute with other IoT gadgets. IoT applications have been fundamentally executed with advances, for example, cloud and haze registering. That means how we implement BIoT in a few futuristic networks. BIoT coordination in Docker Deploy Container, Food Sector (Supply Chain Management), Industrial Cloud, Fog Computing, and Hybrid Computing.
APA, Harvard, Vancouver, ISO, and other styles
26

Partida, Alberto, Regino Criado, and Miguel Romance. "Identity and Access Management Resilience against Intentional Risk for Blockchain-Based IOT Platforms." Electronics 10, no. 4 (February 4, 2021): 378. http://dx.doi.org/10.3390/electronics10040378.

Full text
Abstract:
Some Internet of Things (IoT) platforms use blockchain to transport data. The value proposition of IoT is the connection to the Internet of a myriad of devices that provide and exchange data to improve people’s lives and add value to industries. The blockchain technology transfers data and value in an immutable and decentralised fashion. Security, composed of both non-intentional and intentional risk management, is a fundamental design requirement for both IoT and blockchain. We study how blockchain answers some of the IoT security requirements with a focus on intentional risk. The review of a sample of security incidents impacting public blockchains confirm that identity and access management (IAM) is a key security requirement to build resilience against intentional risk. This fact is also applicable to IoT solutions built on a blockchain. We compare the two IoT platforms based on public permissionless distributed ledgers with the highest market capitalisation: IOTA, run on an alternative to a blockchain, which is a directed acyclic graph (DAG); and IoTeX, its contender, built on a blockchain. Our objective is to discover how we can create IAM resilience against intentional risk in these IoT platforms. For that, we turn to complex network theory: a tool to describe and compare systems with many participants. We conclude that IoTeX and possibly IOTA transaction networks are scale-free. As both platforms are vulnerable to attacks, they require resilience against intentional risk. In the case of IoTeX, DIoTA provides a resilient IAM solution. Furthermore, we suggest that resilience against intentional risk requires an IAM concept that transcends a single blockchain. Only with the interplay of edge and global ledgers can we obtain data integrity in a multi-vendor and multi-purpose IoT network.
APA, Harvard, Vancouver, ISO, and other styles
27

Nourildean, Shayma Wail, Mustafa Dhia Hassib, and Yousra Abd Mohammed. "Internet of things based wireless sensor network: a review." Indonesian Journal of Electrical Engineering and Computer Science 27, no. 1 (July 1, 2022): 246. http://dx.doi.org/10.11591/ijeecs.v27.i1.pp246-261.

Full text
Abstract:
Recently, Internet of Things (IoT) technologies are developing technology with a variety of applications. The Internet of Things (IoTs) is defined as a network of ordinary objects such as Internet TVs, smartphones, actuators and sensors that are smartly connected together to enable new types of communication between people and things as well as between things themselves. Wireless sensor networks (WSNs) play an important part in Internet of Things (IoT) technology. A contribution to wireless sensor networks and IoT applications is wireless sensor nodes’ construction with high-speed CPUs and low-power radio links. The IoT-based wireless Sensor network (WSN) is a game-changing smart monitoring solution. ZigBee standard is an important wireless sensor network (WSN) and Internet of Things (IoT) communication protocol in order to facilitate low-power, low-cost IoT applications and to handle numerous network topologies. This paper presented a review on the energy efficient and routing topologies of ZigBee WSN, applications of IoT enabled Wireless Sensor Network as well IoT WSN security challenges.
APA, Harvard, Vancouver, ISO, and other styles
28

Tulkinbekov, Khikmatullo, and Deok-Hwan Kim. "Deletion-Based Tangle Architecture for Edge Computing." Electronics 11, no. 21 (October 27, 2022): 3488. http://dx.doi.org/10.3390/electronics11213488.

Full text
Abstract:
IOTA Tangle offers a promising approach for distributed ledger technology with the capability to compete with the traditional blockchain. To enable microtransactions the Internet of things (IoT) environment, IOTA employs a direct acrylic graph that ensures the integrity and immutability of the transactions. However, IoT data exhibit time sensitivity, wherein the value is lost after a period. Storing these temporary data for immutable storage would not be affordable in the distributed ledger. This study proposes a novel approach—referred to as D-Tangle—that enables data deletions in the Tangle architecture. To achieve this goal, D-Tangle divides transactions into three categories based on their expiration features and employs the climb-up writing technique. Extensive evaluations prove that D-Tangle enables instant deletions in finite lifetime data. Moreover, immutability and deletion upon request are guaranteed for unknown lifetime data.
APA, Harvard, Vancouver, ISO, and other styles
29

Gong, Li, Xuelei Gong, Ying Liang, Zhiyuan Jia, and Yiqiang Li. "Experimental Study and Microscopic Analysis on Frost Resistance of Iron Ore Tailings Recycled Aggregate Concrete." Advances in Materials Science and Engineering 2022 (May 28, 2022): 1–16. http://dx.doi.org/10.1155/2022/8932229.

Full text
Abstract:
Freeze-thaw harm is the major factor that reduces the durability of hydraulic concrete buildings at high altitudes and in cold regions. To solve the durability problem of hydraulic buildings in alpine regions, the study prepared sixteen groups of concrete specimens with different replacement ratios of iron ore tailings and recycled aggregate were prepared, and indoor deterioration accelerated tests were designed. Nuclear magnetic resonance (NMR) technology was used to analyze the pore distribution in the structure, and macro indicators of concrete mass loss rate and relative dynamic elastic modulus (RDEM), were selected. Combined with SEM, images, the frost resistance of iron ore tailings sand (IOT), with Recycled aggregate concrete (RAC), was explored. The final analysis shows that when only RCA is replaced, the frost resistance of RAC decreases with the increase of the RCA replacement rate. When only replacing IOT, the frost resistance of IOT concrete with a replacement rate of 50% is better than that of other replacement rates. In addition to ordinary concrete, the combination of 30% iron ore tailings and 30% recycled aggregate concrete (RAC3-IOT3) has good frost resistance. The mass loss of the RAC3-IOT3, specimen increased by 0.09% compared with ordinary concrete. From the microscopic level, with the addition of the dosage of RCA, the number of macropores (0.05∼1 μm) and microcracks (>1 μm) in concrete increased. After replacing the appropriate amount of iron ore tailings, the pore space structure of RAC was improved, and some harmful pores spaces were transformed into harmless pores. However, the combination of excess IOT, and RCA, does not improve the interface transition zone of RCA. From the micromorphology, with an increasing dosage of RCA, the bonding force between cementitious material and sand aggregate weakens and there are more pores. The combination of excess IOT, and RCA, does not improve the interface transition zone of RCA but will accelerate the spalling of surface mortar because of its small fineness. All things considered, RAC3-IOT3 is the most suitable concrete for high altitude and cold areas.
APA, Harvard, Vancouver, ISO, and other styles
30

Hou, Li-Yuan, Tsung-Yi Tang, and Tyng-Yeu Liang. "IOTA-BT: A P2P File-Sharing System Based on IOTA." Electronics 9, no. 10 (October 1, 2020): 1610. http://dx.doi.org/10.3390/electronics9101610.

Full text
Abstract:
BitTorrent (BT) is the most popular peer-to-peer file-sharing system. According to official BT information, more than 100 million active users use BT for file transfers every month. However, BT mainly relies on either a central tracker (tracker) or distributed hash table (DHT) for locating file seeders while it runs a risk of a single point of failure or cyber-attacks such as Sybil and Eclipses. To attack this problem, we proposed a Peer-to-Peer (P2P) file-sharing system called IOTA-BT by integrating BitTorrent with IOTA in this paper. The advantages of IOTA over blockchain include scalability for high throughput, compatibility with Internet of Things (IoT) footprints, zero transaction fees, partition-tolerant, and quantum-resistant cryptography. The autopeering and neighbor selection of the Coordicide of IOTA is aimed at defending a Sybil or Eclipse attack. IOTA-BT inherits these advantages from IOTA. Moreover, our experimental results have shown that the cost of executing BT functions, such as releasing torrent files and retrieving seeder information on IOTA-BT, is acceptable for improving the security of BT. IOTA-BT can indeed efficiently provide users with a P2P file-sharing environment of higher security.
APA, Harvard, Vancouver, ISO, and other styles
31

Samkri, Eman, and Norah Farooqi. "Dynamic-IoTrust: A Dynamic Access Control for IoT Based on Smart Contracts." International Journal of Engineering & Technology 10, no. 2 (August 10, 2021): 139. http://dx.doi.org/10.14419/ijet.v10i2.31553.

Full text
Abstract:
The Internet of things (IoT) is an active, real-world area in need of more investigation. One of the top weaknesses in security challenges that IoTs face, the centralized access control server, which can be a single point of failure. In this paper, Dynamic-IoTrust, a decentralized access control smart contract based aims to overcome distrusted, dynamic, trust and authentication issues for access control in IoT. It also integrates dynamic trust value to evaluate users based on behavior. In particular, the Dynamic-IoTrust contains multiple Main Smart Contract, one Register Contract, and one Judging Contract to achieve efficient distributed access control management. Dynamic-IoTrust provides both static access rights by allowing predefined access control policies and also provides dynamic access rights by checking the trust value and the behavior of the user. The system also provides to detected user misbehavior and make a decision for user trust value and penalty. There are several levels of trusted users to access the IoTs device. Finally, the case study demonstrates the feasibility of the Dynamic-IoTrust model to offer a dynamic decentralized access control system with trust value attribute to evaluate the internal user used IoTs devices.
APA, Harvard, Vancouver, ISO, and other styles
32

Jiang, Jielin, Zheng Li, Yuan Tian, and Najla Al-Nabhan. "A Review of Techniques and Methods for IoT Applications in Collaborative Cloud-Fog Environment." Security and Communication Networks 2020 (September 7, 2020): 1–15. http://dx.doi.org/10.1155/2020/8849181.

Full text
Abstract:
Cloud computing is widely used for its powerful and accessible computing and storage capacity. However, with the development trend of Internet of Things (IoTs), the distance between cloud and terminal devices can no longer meet the new requirements of low latency and real-time interaction of IoTs. Fog has been proposed as a complement to the cloud which moves servers to the edge of the network, making it possible to process service requests of terminal devices locally. Despite the fact that fog computing solves many obstacles for the development of IoT, there are still many problems to be solved for its immature technology. In this paper, the concepts and characteristics of cloud and fog computing are introduced, followed by the comparison and collaboration between them. We summarize main challenges IoT faces in new application requirements (e.g., low latency, network bandwidth constraints, resource constraints of devices, stability of service, and security) and analyze fog-based solutions. The remaining challenges and research directions of fog after integrating into IoT system are discussed. In addition, the key role that fog computing based on 5G may play in the field of intelligent driving and tactile robots is prospected.
APA, Harvard, Vancouver, ISO, and other styles
33

Jung, Younchan, and Ronnel Agulto. "Virtual IP-Based Secure Gatekeeper System for Internet of Things." Sensors 21, no. 1 (December 23, 2020): 38. http://dx.doi.org/10.3390/s21010038.

Full text
Abstract:
The advantage of using the Network Address Translation device is that the internal IP address, which makes the IP address space of Internet of Things (IoT) devices expanded, is invisible from the outside and safe from external attacks. However, the use of these private IPv4 addresses poses traversal problems, especially for the mobile IoTs to operate peer-to-peer applications. An alternative solution is to use IPv6 technologies for future IoT devices. However, IPv6 package, including IPSec, is too complex to apply to the IoT device because it is a technology developed for the user terminal with enough computing power. This paper proposes a gatekeeper to enable the real IP addresses of IoTs inside the same subnetwork to be not explicitly addressable and visible from outside of the gatekeeper. Each IoT device publishes its virtual IP address via the Registrar Server or Domain Name System (DNS) with which the gatekeeper shares the address mapping information. While the gatekeeper maintains the mapping information for the local IoT devices, the registration server or DNS has global address mapping information so that any peer can reach the mapping information. All incoming and outgoing packets must pass through the gatekeeper responsible for the address conversion and security checks for them from the entrance. This paper aims to apply our gatekeeper system to a platform of self-driving cars that allows surrounding IoT cameras and autonomous vehicles to communicate with each other securely, safely, and rapidly. So, this paper finally analyzes improvement effects on latency to show that our gatekeeper system guarantees the latency goal of 20 ms under the environment of 5G links.
APA, Harvard, Vancouver, ISO, and other styles
34

Domingos, Dulce, and Francisco Martins. "Using BPMN to model Internet of Things behavior within business process." International Journal of Information Systems and Project Management 5, no. 4 (January 31, 2022): 39–51. http://dx.doi.org/10.12821/ijispm050403.

Full text
Abstract:
Whereas, traditionally, business processes use the Internet of Things (IoTs) as a distributed source of information, the increase of computational capabilities of IoT devices provides them with the means to also execute parts of the business logic, reducing the amount of exchanged data and central processing. Current approaches based on Business Process Model and Notation (BPMN) already support modelers to define both business processes and IoT devices behavior at the same level of abstraction. However, they are not restricted to standard BPMN elements and they generate IoT device specific low-level code. The work we present in this paper exclusivelly uses standard BPMN to define central as well as IoT behavior of business processes. In addition, the BPMN that defines the IoT behavior is translated to a neutral-platform programming code. The deployment and execution environments use Web services to support the communication between the process execution engine and IoT devices.
APA, Harvard, Vancouver, ISO, and other styles
35

Hellani, Houssein, Layth Sliman, Abed Ellatif Samhat, and Ernesto Exposito. "Computing Resource Allocation Scheme for DAG-Based IOTA Nodes." Sensors 21, no. 14 (July 9, 2021): 4703. http://dx.doi.org/10.3390/s21144703.

Full text
Abstract:
IOTA is a distributed ledger technology (DLT) platform proposed for the internet of things (IoT) systems in order to tackle the limitations of Blockchain in terms of latency, scalability, and transaction cost. The main concepts used in IOTA to reach this objective are a directed acyclic graph (DAG) based ledger, called Tangle, used instead of the chain of blocks, and a new validation mechanism that, instead of relying on the miners as it is the case in Blockchain, relies on participating nodes that cooperate to validate the new transactions. Due to the different IoT capabilities, IOTA classifies these devices into full and light nodes. The light nodes are nodes with low computing resources which seek full nodes’ help to validate and attach its transaction to the Tangle. The light nodes are manually connected to the full nodes by using the full node IP address or the IOTA client load balancer. This task distribution method overcharges the active full nodes and, thus, reduces the platform’s performance. In this paper, we introduce an efficient mechanism to distribute the tasks fairly among full nodes and hence achieve load balancing. To do so, we consider the task allocation between the nodes by introducing an enhanced resource allocation scheme based on the weight least connection algorithm (WLC). To assess its performance, we investigate and test different implementation scenarios. The results show an improved balancing of data traffic among full nodes based on their weights and number of active connections.
APA, Harvard, Vancouver, ISO, and other styles
36

Sun, Yizhen, Jianjiang Yu, Jianwei Tian, Zhongwei Chen, Weiping Wang, and Shigeng Zhang. "IoT-IE: An Information-Entropy-Based Approach to Traffic Anomaly Detection in Internet of Things." Security and Communication Networks 2021 (December 30, 2021): 1–13. http://dx.doi.org/10.1155/2021/1828182.

Full text
Abstract:
Security issues related to the Internet of Things (IoTs) have attracted much attention in many fields in recent years. One important problem in IoT security is to recognize the type of IoT devices, according to which different strategies can be designed to enhance the security of IoT applications. However, existing IoT device recognition approaches rarely consider traffic attacks, which might change the pattern of traffic and consequently decrease the recognition accuracy of different IoT devices. In this work, we first validate by experiments that traffic attacks indeed decrease the recognition accuracy of existing IoT device recognition approaches; then, we propose an approach called IoT-IE that combines information entropy of different traffic features to detect traffic anomaly. We then enhance the robustness of IoT device recognition by detecting and ignoring the abnormal traffic detected by our approach. Experimental evaluations show that IoT-IE can effectively detect abnormal behaviors of IoT devices in the traffic under eight different types of attacks, achieving a high accuracy value of 0.977 and a low false positive rate of 0.011. It also achieves an accuracy of 0.969 in a multiclassification experiment with 7 different types of attacks.
APA, Harvard, Vancouver, ISO, and other styles
37

Gangwani, Pranav, Alexander Perez-Pons, Tushar Bhardwaj, Himanshu Upadhyay, Santosh Joshi, and Leonel Lagos. "Securing Environmental IoT Data Using Masked Authentication Messaging Protocol in a DAG-Based Blockchain: IOTA Tangle." Future Internet 13, no. 12 (December 6, 2021): 312. http://dx.doi.org/10.3390/fi13120312.

Full text
Abstract:
The demand for the digital monitoring of environmental ecosystems is high and growing rapidly as a means of protecting the public and managing the environment. However, before data, algorithms, and models can be mobilized at scale, there are considerable concerns associated with privacy and security that can negatively affect the adoption of technology within this domain. In this paper, we propose the advancement of electronic environmental monitoring through the capability provided by the blockchain. The blockchain’s use of a distributed ledger as its underlying infrastructure is an attractive approach to counter these privacy and security issues, although its performance and ability to manage sensor data must be assessed. We focus on a new distributed ledger technology for the IoT, called IOTA, that is based on a directed acyclic graph. IOTA overcomes the current limitations of the blockchain and offers a data communication protocol called masked authenticated messaging for secure data sharing among Internet of Things (IoT) devices. We show how the application layer employing the data communication protocol, MAM, can support the secure transmission, storage, and retrieval of encrypted environmental sensor data by using an immutable distributed ledger such as that shown in IOTA. Finally, we evaluate, compare, and analyze the performance of the MAM protocol against a non-protocol approach.
APA, Harvard, Vancouver, ISO, and other styles
38

Mann, Monique, Michael Wilson, and Ian Warren. "Smart Parenting? The Internet of Things, Children’s Privacy, and Data Justice." International Journal of Children’s Rights 30, no. 1 (February 14, 2022): 204–31. http://dx.doi.org/10.1163/15718182-30010008.

Full text
Abstract:
Abstract This paper examines children’s privacy and the Internet of Things (IoT). After describing the operation of IoTs directly marketed to and for children, we outline research concerning the surveillance of children and issues associated with children’s right to privacy, including the role of parents or guardians in protecting their children’s right to privacy. We then present the findings of a survey of Australian IoT consumers and non-consumers (n = 1,052), which shows parents and guardians who purchase IoTs care about their children’s privacy and are concerned about practices of corporate surveillance. Finally, our data show that female parents or guardians have lower rates of privacy literacy than males. Analysed through the lens of data justice (Dencik et al., 2016), we argue the protection of children’s privacy rights must be understood with regard to broader structural factors, such as gender discrimination and digital housekeeping, and ultimately requires addressing corporate practices that characterise the contemporary surveillance landscape.
APA, Harvard, Vancouver, ISO, and other styles
39

Lo Giudice, Paolo, Antonino Nocera, Domenico Ursino, and Luca Virgili. "Building Topic-Driven Virtual IoTs in a Multiple IoTs Scenario." Sensors 19, no. 13 (July 4, 2019): 2956. http://dx.doi.org/10.3390/s19132956.

Full text
Abstract:
In the last years, several attempts to combine the Internet of Things (IoT) and social networking have been made. In the meantime, things involved in IoT are becoming increasingly sophisticated and intelligent, showing a behavior that tends to look like the one of users in social networks. Therefore, it is not out of place to talk about profiles of things and about information and topics exchanged among them. In such a context, constructing topic-driven virtual communities starting from the real ones operating in a Multi-IoT scenario is an extremely challenging issue. This paper aims at providing some contributions in this setting. First of all, it presents the concept of profile of a thing. Then, it introduces the concept of topic-guided virtual IoT. Finally, it illustrates two approaches (one supervised and one unsupervised) to constructing topic-guided virtual IoTs in a Multi-IoT scenario.
APA, Harvard, Vancouver, ISO, and other styles
40

Mohammed, Baydaa Hashim, Hasimi Sallehuddin, Elaheh Yadegaridehkordi, Nurhizam Safie Mohd Satar, Afifuddin Husairi Bin Hussain, and Shaymaa Abdelghanymohamed. "Nexus between Building Information Modeling and Internet of Things in the Construction Industries." Applied Sciences 12, no. 20 (October 20, 2022): 10629. http://dx.doi.org/10.3390/app122010629.

Full text
Abstract:
The process of integrating building information modeling (BIM) and Internet of Things (IoT)-based data sources is a recent development. As a generalization, BIM and IoT data provide complementary perspectives on the project that complement each other’s constraints. Applying the concept of BIM-IoT in the construction industries which has been termed to have a high-risk factor could offer an improvement in the overall performance of the construction industries and thereby reduce the associated risks. This study aims to examine the potential of integrating BIM-IoTs in the construction industries by examining related published literature. Literature analysis revealed that the BIM and IoT have been extensively applied individually to several aspects of construction projects such as construction safety risk assessment, construction conflict management, building construction sustainability, and onsite construction process monitoring. However, there is scanty research awareness on the possibilities of BIM-IoT integration in the construction industries.
APA, Harvard, Vancouver, ISO, and other styles
41

Guerrero-Ulloa, Gleiston, Carlos Rodríguez-Domínguez, and Miguel J. Hornos. "Agile Methodologies Applied to the Development of Internet of Things (IoT)-Based Systems: A Review." Sensors 23, no. 2 (January 10, 2023): 790. http://dx.doi.org/10.3390/s23020790.

Full text
Abstract:
Throughout the evolution of software systems, empirical methodologies have been used in their development process, even in the Internet of Things (IoT) paradigm, to develop IoT-based systems (IoTS). In this paper, we review the fundamentals included in the manifesto for agile software development, especially in the Scrum methodology, to determine its use and role in IoTS development. Initially, 4303 documents were retrieved, a number that was reduced to 186 after applying automatic filters and by the relevance of their titles. After analysing their contents, only 60 documents were considered. Of these, 38 documents present the development of an IoTS using some methodology, 8 present methodologies focused on the construction of IoTS software, and 14 present methodologies close to the systems life cycle (SLC). Finally, only one methodology can be considered SLC-compliant. Out of 38 papers presenting the development of some IoTS following a methodology for traditional information systems (ISs), 42.1% have used Scrum as the only methodology, while 10.5% have used Scrum combined with other methodologies, such as eXtreme Programming (XP), Kanban and Rapid Prototyping. In the analysis presented herein, the existing methodologies for developing IoTSs have been grouped according to the different approaches on which they are based, such as agile, modelling, and service oriented. This study also analyses whether the different proposals consider the standard stages of the development process or not: planning and requirements gathering, solution analysis, solution design, solution coding and unit testing (construction), integration and testing (implementation), and operation and maintenance. In addition, we include a review of the automated frameworks, platforms, and tools used in the methodologies analysed to improve the development of IoTSs and the design of their underlying architectures. To conclude, the main contribution of this work is a review for IoTS researchers and developers regarding existing methodologies, frameworks, platforms, tools, and guidelines for the development of IoTSs, with a deep analysis framed within international standards dictated for this purpose.
APA, Harvard, Vancouver, ISO, and other styles
42

Oh, Hayoung. "Security-aware fair transmission scheme for 802.11 based cognitive IoT." International Journal of Electrical and Computer Engineering (IJECE) 10, no. 3 (June 1, 2020): 2589. http://dx.doi.org/10.11591/ijece.v10i3.pp2589-2599.

Full text
Abstract:
Cognitive IoT is exponentially increased because of various real time and robust applications with sensor networks and big data analysis. Each IoT protocol of network layer can be RPL, COAP and so on based on IETF standards. But still collision problems and security-aware fair transmission on top of scalable IoT devices were not solved enough. In the open wireless LAN system based cognitive IoTs, IoT node that is continuously being stripped of its transmission opportunity will continue to accumulate packets to be sent in the butter and spoofing attacks will not allow the data transfer opportunities to be fair. Therefore, in this paper, we propose a method to reduce the average wait time of all packets in the system by dynamically controlling the contention window (CW) in a wireless LAN based cognitive IoT environment where there are nodes that do not have fair transmission opportunities due to spoofing attacks. Through the performance evaluation, we have proved that the proposed technique improves up to 80% in terms of various performance evaluation than the basic WLAN 802.11 based IoT.
APA, Harvard, Vancouver, ISO, and other styles
43

Abosata, Nasr, Saba Al-Rubaye, and Gokhan Inalhan. "Customised Intrusion Detection for an Industrial IoT Heterogeneous Network Based on Machine Learning Algorithms Called FTL-CID." Sensors 23, no. 1 (December 28, 2022): 321. http://dx.doi.org/10.3390/s23010321.

Full text
Abstract:
Technological breakthroughs in the Internet of Things (IoT) easily promote smart lives for humans by connecting everything through the Internet. The de facto standardised IoT routing strategy is the routing protocol for low-power and lossy networks (RPL), which is applied in various heterogeneous IoT applications. Hence, the increase in reliance on the IoT requires focus on the security of the RPL protocol. The top defence layer is an intrusion detection system (IDS), and the heterogeneous characteristics of the IoT and variety of novel intrusions make the design of the RPL IDS significantly complex. Most existing IDS solutions are unified models and cannot detect novel RPL intrusions. Therefore, the RPL requires a customised global attack knowledge-based IDS model to identify both existing and novel intrusions in order to enhance its security. Federated transfer learning (FTL) is a trending topic that paves the way to designing a customised RPL-IoT IDS security model in a heterogeneous IoT environment. In this paper, we propose a federated-transfer-learning-assisted customised distributed IDS (FT-CID) model to detect RPL intrusion in a heterogeneous IoT. The design process of FT-CID includes three steps: dataset collection, FTL-assisted edge IDS learning, and intrusion detection. Initially, the central server initialises the FT-CID with a predefined learning model and observes the unique features of different RPL-IoTs to construct a local model. The experimental model generates an RPL-IIoT dataset with normal and abnormal traffic through simulation on the Contiki-NG OS. Secondly, the edge IDSs are trained using the local parameters and the globally shared parameters generated by the central server through federation and aggregation of different local parameters of various edges. Hence, transfer learning is exploited to update the server’s and edges’ local and global parameters based on relational knowledge. It also builds and customised IDS model with partial retraining through local learning based on globally shared server knowledge. Finally, the customised IDS in the FT-CID model enforces the detection of intrusions in heterogeneous IoT networks. Moreover, the FT-CID model accomplishes high RPL security by implicitly utilising the local and global parameters of different IoTs with the assistance of FTL. The FT-CID detects RPL intrusions with an accuracy of 85.52% in tests on a heterogeneous IoT network.
APA, Harvard, Vancouver, ISO, and other styles
44

Hsu, Fu-Hau, Jyun-Shao Wu, Chih-Wen Ou, Tzu-Chi Liu, and Yung-Yu Zhuang. "IoTD: An approach to identify E-mails sent by IoT devices." Computer Communications 179 (November 2021): 62–72. http://dx.doi.org/10.1016/j.comcom.2021.07.024.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

Vishwakarma, Lokendra, and Debasis Das. "SCAB - IoTA: Secure communication and authentication for IoT applications using blockchain." Journal of Parallel and Distributed Computing 154 (August 2021): 94–105. http://dx.doi.org/10.1016/j.jpdc.2021.04.003.

Full text
APA, Harvard, Vancouver, ISO, and other styles
46

Carelli, Alberto, Andrea Palmieri, Antonio Vilei, Fabien Castanier, and Andrea Vesco. "Enabling Secure Data Exchange through the IOTA Tangle for IoT Constrained Devices." Sensors 22, no. 4 (February 11, 2022): 1384. http://dx.doi.org/10.3390/s22041384.

Full text
Abstract:
Internet-of-Things (IoT) and sensor technologies have enabled the collection of data in a distributed fashion for analysis and evidence-based decision making. However, security concerns regarding the source, confidentiality and integrity of the data arise. The most common method of protecting data transmission in sensor systems is Transport Layer Security (TLS) or its datagram counterpart (DTLS) today, but exist an alternative option based on Distributed Ledger Technology (DLT) that promise strong security, ease of use and potential for large scale integration of heterogeneous sensor systems. A DLT such as the IOTA Tangle offers great potential to improve sensor data exchange. This paper presents L2Sec, a cryptographic protocol which is able to secure data exchanged over the IOTA Tangle. This protocol is suitable for implementation on constrained devices, such as common IoT devices, leading to greater scalability. The first experimental results evidence the effectiveness of the approach and advocate for the integration of an hardware secure element to improve the overall security of the protocol. The L2Sec source code is released as open source repository on GitHub.
APA, Harvard, Vancouver, ISO, and other styles
47

Suresh, P., and S. Koteeswaran. "Conclave of Internet of Things for Smart Applications: A concise Review." International Journal of Engineering & Technology 7, no. 2.19 (April 17, 2018): 36. http://dx.doi.org/10.14419/ijet.v7i2.19.13794.

Full text
Abstract:
The Internet-of-Things (IoTs) converse immense integration of digital gadgets, cars, homes, and other items to gather and trade information. It is the permitting generation for an embarrassment of applications touching diverse factors of daily lives, together with healthcare, smart home automation, surveillance and smart manufacturing. IoT design architectures which already existing are closely depend upon a middle community and centralized for all decision making approaches. This could result in inefficiencies in computational processing, network traffic control and power consumption [6].Under this study, we promote the efficacy of the IoT features to sustain the user applications in various domains for the urban computing providing the smartness. IoT generations are becoming the same to range in use instances and application scenarios, deployment modes and operational goals. This study reveals the fact the IoT in massive brings a large quantity of components drastically spread over the wide geographical regions.
APA, Harvard, Vancouver, ISO, and other styles
48

Khan, Dost Muhammad, Muhammad Jameel Sumra, and Faisal Shahzad. "Data Streaming of Healthcare from Internet of Things (IoTs) using Big Data Analytics." Global Social Sciences Review IV, no. I (March 31, 2019): 287–95. http://dx.doi.org/10.31703/gssr.2019(iv-i).38.

Full text
Abstract:
The present study aims at the concept of the IoTs (IoT) and its relation with the healthcare sector. Nowadays, IoT is the main focus of researchers and scientists while this concept illustrates the data stream generated from IoT devices in massive amounts like big data with a continuous stream that requires its proper handling. This study aims at the analytical processing of big datasets having a medical history of patients and their diseases. The data cleansing is applied before going through the analytics phase due to the existence of some noisy and missing data. The analytics of data identified that what events are happening while the mining approaches identified why and how events are happening. Together, both phases help in data analytics and mining. Finally, the analytics and visualization led to the decision making and its results depict the effectiveness and efficiency of the proposed framework for data analytics in IoT
APA, Harvard, Vancouver, ISO, and other styles
49

Uddin, Md Ashraf, Andrew Stranieri, Iqbal Gondal, and Venki Balasurbramanian. "A Lightweight Blockchain Based Framework for Underwater IoT." Electronics 8, no. 12 (December 16, 2019): 1552. http://dx.doi.org/10.3390/electronics8121552.

Full text
Abstract:
The Internet of Things (IoT) has facilitated services without human intervention for a wide range of applications, including underwater monitoring, where sensors are located at various depths, and data must be transmitted to surface base stations for storage and processing. Ensuring that data transmitted across hierarchical sensor networks are kept secure and private without high computational cost remains a challenge. In this paper, we propose a multilevel sensor monitoring architecture. Our proposal includes a layer-based architecture consisting of Fog and Cloud elements to process and store and process the Internet of Underwater Things (IoUT) data securely with customized Blockchain technology. The secure routing of IoUT data through the hierarchical topology ensures the legitimacy of data sources. A security and performance analysis was performed to show that the architecture can collect data from IoUT devices in the monitoring region efficiently and securely.
APA, Harvard, Vancouver, ISO, and other styles
50

Ali Khan, Muhammad Usman, Raad Raad, Faisel Tubbal, Panagiotis Ioannis Theoharis, Sining Liu, and Javad Foroughi. "Bending Analysis of Polymer-Based Flexible Antennas for Wearable, General IoT Applications: A Review." Polymers 13, no. 3 (January 22, 2021): 357. http://dx.doi.org/10.3390/polym13030357.

Full text
Abstract:
Flexible substrates have become essential in order to provide increased flexibility in wearable sensors, including polymers, plastic, paper, textiles and fabrics. This study is to comprehensively summarize the bending capabilities of flexible polymer substrate for general Internet of Things (IoTs) applications. The basic premise is to investigate the flexibility and bending ability of polymer materials as well as their tendency to withstand deformation. We start by providing a chronological order of flexible materials which have been used during the last few decades. In the future, the IoT is expected to support a diverse set of technologies to enable new applications through wireless connectivity. For wearable IoTs, flexibility and bending capabilities of materials are required. This paper provides an overview of some abundantly used polymer substrates and compares their physical, electrical and mechanical properties. It also studies the bending effects on the radiation performance of antenna designs that use polymer substrates. Moreover, we explore a selection of flexible materials for flexible antennas in IoT applications, namely Polyimides (PI), Polyethylene Terephthalate (PET), Polydimethylsiloxane (PDMS), Polytetrafluoroethylene (PTFE), Rogers RT/Duroid and Liquid Crystal Polymer (LCP). The study includes a complete analysis of bending and folding effects on the radiation characteristics such as S-parameters, resonant frequency deviation and the impedance mismatch with feedline of the flexible polymer substrate microstrip antennas. These flexible polymer substrates are useful for future wearable devices and general IoT applications.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography