Siga este link para ver outros tipos de publicações sobre o tema: IoT orienté services.

Artigos de revistas sobre o tema "IoT orienté services"

Crie uma referência precisa em APA, MLA, Chicago, Harvard, e outros estilos

Selecione um tipo de fonte:

Veja os 50 melhores artigos de revistas para estudos sobre o assunto "IoT orienté services".

Ao lado de cada fonte na lista de referências, há um botão "Adicionar à bibliografia". Clique e geraremos automaticamente a citação bibliográfica do trabalho escolhido no estilo de citação de que você precisa: APA, MLA, Harvard, Chicago, Vancouver, etc.

Você também pode baixar o texto completo da publicação científica em formato .pdf e ler o resumo do trabalho online se estiver presente nos metadados.

Veja os artigos de revistas das mais diversas áreas científicas e compile uma bibliografia correta.

1

Díaz López, Daniel, María Blanco Uribe, Claudia Santiago Cely, Daniel Tarquino Murgueitio, Edwin Garcia Garcia, Pantaleone Nespoli e Félix Gómez Mármol. "Developing Secure IoT Services: A Security-Oriented Review of IoT Platforms". Symmetry 10, n.º 12 (27 de novembro de 2018): 669. http://dx.doi.org/10.3390/sym10120669.

Texto completo da fonte
Resumo:
Undoubtedly, the adoption of the Internet of Things (IoT) paradigm has impacted on our every-day life, surrounding us with smart objects. Thus, the potentialities of this new market attracted the industry, so that many enterprises developed their own IoT platforms aiming at helping IoT services’ developers. In the multitude of possible platforms, selecting the most suitable to implement a specific service is not straightforward, especially from a security perspective. This paper analyzes some of the most prominent proposals in the IoT platforms market-place, performing an in-depth security comparison using five common criteria. These criteria are detailed in sub-criteria, so that they can be used as a baseline for the development of a secure IoT service. Leveraging the knowledge gathered from our in-depth study, both researchers and developers may select the IoT platform which best fits their needs. Additionally, an IoT service for monitoring commercial flights is implemented in two previously analyzed IoT platforms, giving an adequate detail level to represent a solid guideline for future IoT developers.
Estilos ABNT, Harvard, Vancouver, APA, etc.
2

Gross, Erwin, Peter Schrader, Till Gramberg, Mirko Schneider e Thomas Bauernhansl. "Identifikation und Auswahl von digitalen Services/Identification and selection of digital services". wt Werkstattstechnik online 113, n.º 09 (2023): 376–81. http://dx.doi.org/10.37544/1436-4980-2023-09-40.

Texto completo da fonte
Resumo:
Digitale Services und smarte Produkte revolutionieren das Geschäft mit Maschinen und Anlagen. Cloud Computing, IoT und KI erlauben Unternehmen, ihre Produkte mit digitalen Services an Kundenbedürfnisse anzupassen. Das traditionelle Verkaufsgeschäft wandelt sich zu serviceorientierten Produkt-Service-Systemen. Wie können Unternehmen attraktive digitale Services identifizieren, um Wettbewerbsvorteile zu erzielen und innovative Geschäftsmodelle zu entwickeln? Ein Ansatz wird im Folgenden erläutert. Digital services and smart products are revolutionizing the machinery and equipment business. Cloud computing, IoT and AI enable companies to better align their products to customer needs with digital services. The traditional sales business is transforming into service-oriented product-service systems. How can companies identify attractive digital services to gain competitive advantage and develop innovative business models? One approach is explained below.
Estilos ABNT, Harvard, Vancouver, APA, etc.
3

Machorro-Cano, Isaac, José Oscar Olmedo-Aguirre, Giner Alor-Hernández, Lisbeth Rodríguez-Mazahua, José Luis Sánchez-Cervantes e Asdrúbal López-Chau. "SCM-IoT: An Aproach for Internet of Things Services Integration and Coordination". Applied Sciences 12, n.º 6 (18 de março de 2022): 3133. http://dx.doi.org/10.3390/app12063133.

Texto completo da fonte
Resumo:
Today, new applications demand an internet of things (IoT) infrastructure with greater intelligence in our daily use devices. Among the salient features that characterize intelligent IoT systems are interoperability and dynamism. While service-oriented architectures (SOA) offer a well-developed and standardized architecture and protocols for interoperability, answering whether SOA offers enough dynamism to merge IoT with artificial intelligence (AI) is still in its beginnings. This paper proposes an SOA model, called SCM-IoT (service composition model for IoT), for incorporating AI into IoT systems, addressing their coordination by a mediator offering services for storage, production, discovery, and notification of relevant data for client applications. The model allows IoT systems to be incrementally developed from three perspectives: a conceptual model, platform-independent computational model, and platform-dependent computational model. Finally, as a case of study, a domotic IoT system application is developed in SCM-IoT to analyze the characteristics and benefits of the proposed approach.
Estilos ABNT, Harvard, Vancouver, APA, etc.
4

Raiyn, Jamal. "Introduction to Big Data Management Based on Agent Oriented Cyber Security". Journal of Telecommunications and Information Technology, n.º 1 (30 de março de 2017): 65–70. http://dx.doi.org/10.26636/jtit.2017.1.652.

Texto completo da fonte
Resumo:
This paper deals with information security and safety issues in public open spaces. Public open spaces include high streets, street markets, shopping centers, community gardens, parks, and playgrounds, each of which plays a vital role in the social, cultural and economic life of a community. Those outdoor public places are mashed up with various ICT tools, such as video surveillance, smartphone apps, Internet of Things (IoT) technologies, and biometric big data (called Cyber Parks). Security and safety in public places may include video surveillance of movement and the securing of personalized information and location-based services. The article introduces technologies used in Cyber Parks to achieve information security in big data era.
Estilos ABNT, Harvard, Vancouver, APA, etc.
5

Jaadouni, Hatim, Chaimae Saadi e Habiba Chaoui. "SDN/NFV architectures for edge-cloud oriented IoT". ITM Web of Conferences 46 (2022): 02004. http://dx.doi.org/10.1051/itmconf/20224602004.

Texto completo da fonte
Resumo:
Thanks to Software Defined Networking (SDN) and Network Functions Virtualization (NFV), the use and behaviour of interconnect network backhauls to provide virtualization services has changed completely. Several benefits have been discovered in various application areas that combine SDN and NFV. As a result, we explored the SDN / NFV paradigm to determine if network services could be efficiently deployed, managed, and distributed to end users. The Internet of Things (IoT) is inseparable from improving SDN / b NFV to improve this task. However, until now, problems related to Edge cloud communications and network services have not been effectively mitigated. The rest of this article is organized as follows. We first present the background of this work. Then we present the new technologies around these topics and the extended architecture, and e. Finally, we conclude this work.
Estilos ABNT, Harvard, Vancouver, APA, etc.
6

Giao, Joao, Artem A. Nazarenko, Fernando Luis-Ferreira, Diogo Gonçalves e Joao Sarraipa. "A Framework for Service-Oriented Architecture (SOA)-Based IoT Application Development". Processes 10, n.º 9 (5 de setembro de 2022): 1782. http://dx.doi.org/10.3390/pr10091782.

Texto completo da fonte
Resumo:
In the last decades, the increasing complexity of industrial information technology has led to the emergence of new trends in manufacturing. Factories are using multiple Internet of Things (IoT) platforms to harvest sensor information to improve production. Such a transformation contributes to efficiency growth and reduced production costs. To deal with the heterogeneity of the services within an IoT system, Service-Oriented Architecture (SOA) is referred to in the literature as being advantageous for the design and development of software to support IoT-based production processes. The aim of SOA-based design is to provide the leverage to use and reuse loosely coupled IoT services at the middleware layer to minimise system integration problems. We propose a system architecture that follows the SOA architectural pattern and enables developers and business process designers to dynamically add, query or use instances of existing modular software in the IoT context. Furthermore, an analysis of utilization of modular software that presents some challenges and limitations of this approach is also in the scope of this work.
Estilos ABNT, Harvard, Vancouver, APA, etc.
7

Alsaig, Alaa, Vangalur Alagar, Zaki Chammaa e Nematollaah Shiri. "Characterization and Efficient Management of Big Data in IoT-Driven Smart City Development". Sensors 19, n.º 11 (28 de maio de 2019): 2430. http://dx.doi.org/10.3390/s19112430.

Texto completo da fonte
Resumo:
Smart city is an emerging initiative for integrating Information and Communication Technologies (ICT) in effective ways to support development of smart cities with enhanced quality of life for its citizens through safe and secure context-aware services. Major technical challenges to realize smart cities include resource use optimization, service delivery without interruption at all times in all aspects, minimization of costs, and reduction of resource consumption. To address these challenges, new techniques and technologies are required for modeling and processing the big data generated and used through the underlying Internet of Things (IoT). To this end, we propose a data-centric approach to IoT in conceptualizing the “things” from a service-oriented perspective and investigate efficient ways to identify, integrate, and manage big data. The data-centric approach is expected to better support efficient management of data with complexities inherent in IoT-generated big data. Furthermore, it supports efficient and scalable query processing and reasoning techniques required in development of smart city applications. This article redresses the literature and contributes to the foundations of smart cities applications.
Estilos ABNT, Harvard, Vancouver, APA, etc.
8

Sim, Sungho, e Hanyong Choi. "A study on the service discovery support method in the IoT environments". International Journal of Electrical Engineering & Education 57, n.º 1 (5 de dezembro de 2018): 85–96. http://dx.doi.org/10.1177/0020720918813824.

Texto completo da fonte
Resumo:
The fourth Industrial Revolution is rapidly growing due to the development of ICT and the need for organic linkage in the industry. The Internet of Things (IoT), in which objects and objects from active relationships such as sensing, networking and mutual cooperation without human intervention is the core technology of the fourth Industrial Revolution, which can be linked to various industrial fields. As the IoT environment spreads, IoT devices are continuously increasing in various industries. IoT devices connected to the Internet are as different as each application environment. Many information is derived from the interaction between an IoT device and a device or between a human and an IoT device, as well as devices that provide simple data such as sensing. This paper proposes a support method to enable extended service search when users search for services using information generated in IoT environment. The existing service discovery method focuses on the method by which the user selects the service based on the simple service information disclosed by the service provider. In order to solve the problem of existing service discovery method, this study proposed a support method that enables users to search service discovery flexibly even when using existing methods in service discovery in IoT environment. The proposed method provides a user-centered service search environment construction through a search method using user IoT information which was not considered in the existing service search. This makes up for the problem of service availability and provider-oriented service discovery through the establishment of a user service discovery environment.
Estilos ABNT, Harvard, Vancouver, APA, etc.
9

Kiavarz, H., M. Jadidi, A. Rajabifard e G. Sohn. "BIM-GIS ORIENTED INTELLIGENT KNOWLEDGE DISCOVERY". ISPRS - International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences XLII-4/W10 (12 de setembro de 2018): 79–82. http://dx.doi.org/10.5194/isprs-archives-xlii-4-w10-79-2018.

Texto completo da fonte
Resumo:
<p><strong>Abstract.</strong> Urban and population growth results in increasing pressure on the public utilities like transport, energy, healthcare services, crime management and emergency services in the realm of smart city management. Smart management of these services increases the necessity of dealing with big data which is come from different sources with various types and formats like 3D city information, GPS, traffic, mobile, Building Information Model (BIM), environmental, social activities and IoT stream data. Therefore, an approach to mine/analysis/interpret these data and extract useful knowledge from this diverse big data sources emerges in order to extract the hidden pattern of data using computational algorithms from statistics, machine learning and information theory. However, inconsistency, duplication and repetition and misconducting with the different type of discrete and continuous data can cause erroneous decision-making. This paper focuses on providing a rules extraction and supervised-decision making methods for facilitating the fusion of BIM and 2D and 3D GIS-based information coupling with IoT stream data residing in a spatial database and 3D BIM data. The proposed methods can be used in those applications like Emergency Response, Evacuation Planning, Occupancy Mapping, and Urban Monitoring to Smart Multi-Buildings so that their input data mostly come from 2D and 3D GIS, BIM and IoT stream. This research focus on proposing the unified rules extraction and decision engine to help smart citizens and managers using BIM and GIS data to make smart decision rather than focus on applications in certain field of BIM and GIS.</p>
Estilos ABNT, Harvard, Vancouver, APA, etc.
10

Chen, Fei, Duming Luo, Tao Xiang, Ping Chen, Junfeng Fan e Hong-Linh Truong. "IoT Cloud Security Review". ACM Computing Surveys 54, n.º 4 (maio de 2021): 1–36. http://dx.doi.org/10.1145/3447625.

Texto completo da fonte
Resumo:
Recent years have seen the rapid development and integration of the Internet of Things (IoT) and cloud computing. The market is providing various consumer-oriented smart IoT devices; the mainstream cloud service providers are building their software stacks to support IoT services. With this emerging trend even growing, the security of such smart IoT cloud systems has drawn much research attention in recent years. To better understand the emerging consumer-oriented smart IoT cloud systems for practical engineers and new researchers, this article presents a review of the most recent research efforts on existing, real, already deployed consumer-oriented IoT cloud applications in the past five years using typical case studies. Specifically, we first present a general model for the IoT cloud ecosystem. Then, using the model, we review and summarize recent, representative research works on emerging smart IoT cloud system security using 10 detailed case studies, with the aim that the case studies together provide insights into the insecurity of current emerging IoT cloud systems. We further present a systematic approach to conduct a security analysis for IoT cloud systems. Based on the proposed security analysis approach, we review and suggest potential security risk mitigation methods to protect IoT cloud systems. We also discuss future research challenges for the IoT cloud security area.
Estilos ABNT, Harvard, Vancouver, APA, etc.
11

Ebrahimi, Maryam, Mohammad Hesam Tadayon, Mohammad Sayad Haghighi e Alireza Jolfaei. "A Quantitative Comparative Study of Data-oriented Trust Management Schemes in Internet of Things". ACM Transactions on Management Information Systems 13, n.º 3 (30 de setembro de 2022): 1–30. http://dx.doi.org/10.1145/3476248.

Texto completo da fonte
Resumo:
In the Internet of Things (IoT) paradigm, all entities in the IoT network, whether home users or industrial things, receive data from other things to make decisions. However, in the decentralized, heterogeneous, and rapidly changing IoT network with billions of devices, deciding about where to get the services or information from is critical, especially because malicious entities can exist in such an unmanaged network. Security provisioning alone cannot solve the issue of service quality or reliability. One way to elevate security and reliability in the IoT network is to bridge the gap of trust between objects, and also between humans and objects, while taking into account the IoT network characteristics. Therefore, a proper trust management system must be established on top of the IoT network service architecture. Trust is related to the manner expected from objects in providing services and recommendations. Recommendations are the basis of decision making in every trust management system. Since trust management ideas in the IoT are still immature, the purpose of this article is to survey, analyze, and compare the approaches that have been taken in building trust management systems for the IoT. We break down the features of such systems by analysis and also do quantitative comparisons by simulation. This article is organized into two main parts. First, studies and approaches in this field are compared from four perspectives: (1) trust computation method, (2) resistance to attacks (3) adherence to the limitations of IoT networks and devices, and (4) performance of the trust management scheme. The second part is quantitative and simulates four major methods in this field and measures their performance. We also make extensive analytical comparisons to demonstrate the similarities and discrepancies of current IoT trust management schemes and extract the essence of a resilient trust management framework.
Estilos ABNT, Harvard, Vancouver, APA, etc.
12

Zhao, Shuai, Bo Cheng, Le Yu, Shou-lu Hou, Yang Zhang e Jun-liang Chen. "Internet of Things Service Provisioning Platform for Cross-Application Cooperation". International Journal of Web Services Research 13, n.º 1 (janeiro de 2016): 1–22. http://dx.doi.org/10.4018/ijwsr.2016010101.

Texto completo da fonte
Resumo:
With the development of Internet of Things (IoT), large-scale of resources and applications atop them emerge. However, most of existing efforts are “silo” solutions, there is a tight-coupling between the device and the application. The paradigm for IoT and its corresponding infrastructure are required to move away from isolated solutions towards cooperative models. Recent works have focused on applying Service Oriented Architecture (SOA) to IoT service provisioning. Other than the traditional services of cyberspace which are oriented to a two-tuple problem domain, IoT services are faced with a three-tuple problem domain of user requirement, cyberspace and physical space. One challenge of existing works is lacking of efficient mechanism to on-demand provisioning the sensing information in a loosely-coupled, decentralized way and then dynamically coordinate the relevant services to rapidly respond to changes in the physical world. Another challenge is how to systematically and effectively access (plug) the heterogeneous devices without intrusive changing. This paper proposes a service provisioning platform which enables to access heterogeneous devices and expose device capabilities as light-weighted service, and presents an event-based message interaction mode to facilitate the asynchronous, on-demand sharing of sensing information in distributed, loosely-coupled IoT environment. It provides the basic infrastructure for IoT application pattern: inner-domain high-degree autonomy and inter-domain dynamic coordination. The practicability of platform is validated by experimental evaluations and a District Heating Control and Information System (DHCIS).
Estilos ABNT, Harvard, Vancouver, APA, etc.
13

Kavitha, V., Dr P. Shanmugapriya, A. S. Aisshwaryapriya e M. Harini. "Service based collaborative framework for smart gardening". International Journal of Engineering & Technology 7, n.º 3.3 (8 de junho de 2018): 588. http://dx.doi.org/10.14419/ijet.v7i2.33.14841.

Texto completo da fonte
Resumo:
Service oriented architecture (SOA) is being an evolving technology, which allows various applications to talk with each other and share data and services through a provider, mediator and service requestor with a service description. This paper recommends a way for the development of “smart gardening” using web services in combination with internet of things (IoT). This approach helps to develop, deploy, integrate and manage various services through a collaborative framework for the effective maintenance of plant growth. The usage of IoT will help people to use the sophisticated techniques to improve the maintenance. IoT is used for sensing soil moisture and nutrients, controlling water usage for plant growth and determining custom fertilizer. Further, it also aims to maintain the environmental constancy and sustainability.
Estilos ABNT, Harvard, Vancouver, APA, etc.
14

Koh, Seok-Joo. "Mobile Oriented Future Internet (MOFI): Architectural Designs and Experimentations". Electronics 9, n.º 4 (23 de abril de 2020): 682. http://dx.doi.org/10.3390/electronics9040682.

Texto completo da fonte
Resumo:
With the explosive growth of smart phones and Internet-of-Things (IoT) services, the effective support of seamless mobility for a variety of mobile devices and users is becoming one of the key challenging issues [...]
Estilos ABNT, Harvard, Vancouver, APA, etc.
15

Gao, Zhijun, Zhenyu Liu e Jingmin An. "Cyber-Physical-Social Model for Service Recommendation in the Internet of Things". Mathematical Problems in Engineering 2022 (10 de maio de 2022): 1–13. http://dx.doi.org/10.1155/2022/9523984.

Texto completo da fonte
Resumo:
The services in the Internet of Things (IoT) are the key components to realize the value of IoT. The entity-oriented services are discovered from data. However, a large number of heterogeneous data and entities in IoT increase the difficulty of service development. For this, we propose a cyber-physical-social model to recommend services in IoT. The model consists of four layers: in the physical layer, the individual behavior pattern is defined. The system layer is responsible for handling interaction data to solve the heterogeneous data problem. The cyber layer is the agent layer, where we use the defined agents to establish service logic, shielding the entity heterogeneous problem. In the social layer, we explore the behavior similarity between individual users, achieving entity interaction in different scenes. In experiments, we obtain the data from 5 scenes, and the data is used for 6 experiments. In terms of accuracy and response time, our model has outstanding advantages compared with the previous methods.
Estilos ABNT, Harvard, Vancouver, APA, etc.
16

Qi, Jin, Zian Wang, Bin Xu, Mengfei Wu, Zian Gao e Yanfei Sun. "QoS-Driven Adaptive Trust Service Coordination in the Industrial Internet of Things". Sensors 18, n.º 8 (27 de julho de 2018): 2449. http://dx.doi.org/10.3390/s18082449.

Texto completo da fonte
Resumo:
The adaptive coordination of trust services can provide highly dependable and personalized solutions for industrial requirements in the service-oriented industrial internet of things (IIoT) architecture to achieve efficient utilization of service resources. Although great progress has been made, trust service coordination still faces challenging problems such as trustless industry service, poor coordination, and quality of service (QoS) personalized demand. In this paper, we propose a QoS-driven and adaptive trust service coordination method to implement Pareto-efficient allocation of limited industrial service resources in the background of the IIoT. First, we established a Pareto-effective and adaptive industrial IoT trust service coordination model and introduced a blockchain-based adaptive trust evaluation mechanism to achieve trust evaluation of industrial services. Then, taking advantage of a large and complex search space for solution efficiency, we introduced and compared multi-objective gray-wolf algorithms with the particle swarm optimization (PSO) and dragonfly algorithms. The experimental results showed that by judging and blacklisting malicious raters quickly and accurately, our model can efficiently realize self-adaptive, personalized, and intelligent trust service coordination under the given constraints, improving not only the response time, but also the success rate in coordination.
Estilos ABNT, Harvard, Vancouver, APA, etc.
17

Melian, L., U. T. Anggara e A. Nursikuwagus. "E-Event for Public Relation Services in IoT using Object Oriented Method". IOP Conference Series: Materials Science and Engineering 662 (20 de novembro de 2019): 022060. http://dx.doi.org/10.1088/1757-899x/662/2/022060.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
18

Min, Lingtong, Jiawei Li, Yixin He e Qin Si. "LAP and IRS Enhanced Secure Transmissions for 6G-Oriented Vehicular IoT Services". Drones 7, n.º 7 (22 de junho de 2023): 414. http://dx.doi.org/10.3390/drones7070414.

Texto completo da fonte
Resumo:
In 6G-oriented vehicular Internet of things (IoT) services, the integration of a low altitude platform (LAP) and intelligent reflecting surfaces (IRS) provides a promising solution to achieve seamless coverage and massive connections at low cost. However, due to the open nature of wireless channels, how to protect the transmission of privacy information in LAP-based IRS symbiotic vehicular networks remains a challenge. Motivated by the above, this paper investigates the LAP and IRS enhanced secure transmission problem in the presence of an eavesdropper. Specifically, we first deploy a fixed LAP equipped with IRS to overcome the blockages and introduce artificial noise against the eavesdropper. Next, we formulate a total secure channel capacity maximization problem by optimizing the phase shift, power distribution coefficient, and channel allocation. To effectively solve the formulated problem, we design an iterative algorithm with polynomial complexity, where the optimization variables are solved in turn. In addition, the complexity and convergence of the proposed iterative algorithm are analyzed theoretically. Finally, numerical results show that our proposed secure transmission scheme outperforms the comparison schemes in terms of the total secure channel capacity.
Estilos ABNT, Harvard, Vancouver, APA, etc.
19

Sun, Yunlei, Xiuquan Qiao, Wei Tan, Bo Cheng, Ruisheng Shi e Junliang Chen. "A Low-Delay, Light-Weight Publish/Subscribe Architecture for Delay-Sensitive IOT Services". International Journal of Web Services Research 10, n.º 3 (julho de 2013): 60–81. http://dx.doi.org/10.4018/ijwsr.2013070104.

Texto completo da fonte
Resumo:
In order to build a low-latency and light-weight publish/subscribe (pub/sub) system for delay-sensitive IOT services, the authors propose an efficient and scalable broker architecture named Grid Quorum-based pub/sub (GQPS). As a key component in Event-Driven Service-Oriented Architecture (EDSOA) for IOT services, this architecture organizes multiple pub/sub brokers into a Quorum-based peer-to-peer topology for efficient topic searching. It also leverages a topic searching algorithm and a one-hop caching strategy to minimize the search latency. Light-weight RESTful interfaces make the authors’ GQPS more suitable for IOT services. Cost analysis and experimental study demonstrate that the GQPS achieves a significant performance gain in search satisfaction without compromising search cost. The authors apply the proposed GQPS in the District Heating Control and Information Service System in Beijing, China. This system validates the effectiveness of GQPS.
Estilos ABNT, Harvard, Vancouver, APA, etc.
20

Jonas, Dendy, Evi Maria, Sutarto, Indrastanti Ratna Widiasari, Untung Rahardja e Theophilus Wellem. "Design of a TAM Framework with Emotional Variables in the Acceptance of Health-based IoT in Indonesia". ADI Journal on Recent Innovation (AJRI) 5, n.º 2 (9 de novembro de 2023): 146–54. http://dx.doi.org/10.34306/ajri.v5i2.1005.

Texto completo da fonte
Resumo:
Utilizing IoT based on health services cannot be avoided, especially during a pandemic requiring a screening process for a person's condition. It serves as an important tool for conducting initial health assessments, which are critical in determining subsequent healthcare interventions. Healthcare-oriented IoT solutions offer a cost-effective approach to remote health evaluation, expanding their reach to remote and underserved areas. The implementation of Safe Entry Stations (SES) further enhances this process by capturing fundamental health metrics such as blood pressure, heart rate, and respiratory rate. This article delves into the exploration of the determinants that influence individuals' intentions to adopt health-focused IoT devices. This introduces a new Technology Acceptance Model (TAM) framework by including additional variables. These findings, as revealed through SmartPLS analysis, confirm the significant impact on the acceptance and integration of health-oriented IoT devices. This research underscores the important role of IoT technology in the healthcare sector and contributes relevant insights for its widespread adoption and implementation.
Estilos ABNT, Harvard, Vancouver, APA, etc.
21

Chen, Xuan, Shujuan Tian, Kien Nguyen e Hiroo Sekiya. "Decentralizing Private Blockchain-IoT Network with OLSR". Future Internet 13, n.º 7 (28 de junho de 2021): 168. http://dx.doi.org/10.3390/fi13070168.

Texto completo da fonte
Resumo:
With data transparency and immutability, the blockchain can provide trustless and decentralized services for Internet of Things (IoT) applications. However, most blockchain-IoT networks, especially those with a private blockchain, are built on top of an infrastructure-based wireless network (i.e., using Wi-Fi access points or cellular base stations). Hence, they are still under the risk of Single-Point-of-Failure (SPoF) on the network layer, hindering the decentralization merit, for example, when the access points or base stations get failures. This paper presents an Optimized Link State Routing (OLSR) protocol-based solution for that issue in a private blockchain-IoT application. By decentralizing the underlying network with OLSR, the private blockchain network can avoid SPoF and automatically recover after a failure. Single blockchain connections can be extended to multiple ad hoc hops. Services over blockchain become flexible to fit various IoT scenarios. We show the effectiveness of our solution by constructing a private Ethereum blockchain network running on IoT devices (i.e., Raspberry Pi model 4) with environmental data sensing (i.e., Particular Matter (PM)). The IoT devices use OLSR to form an ad hoc network. The environment data are collected and propagated in transactions to a pre-loaded smart contract periodically. We then evaluate the IoT blockchain network’s recovery time when facing a link error. The evaluation results show that OLSR can automatically recover after the failure. We also evaluate the transaction-oriented latency and block-oriented latency, which indicates the blocks have a high transmission quality, while transactions are transferred individually.
Estilos ABNT, Harvard, Vancouver, APA, etc.
22

You, Ilsun, Giovanni Pau, Valerio Mario Salerno e Vishal Sharma. "Special Issue “Internet of Things for Smart Homes”". Sensors 19, n.º 19 (26 de setembro de 2019): 4173. http://dx.doi.org/10.3390/s19194173.

Texto completo da fonte
Resumo:
Smart homes represent one of the principal points in the new ecosystem of the Internet of Things (IoT), both for the centrality of the home in the life of individuals and the significant potential concerning the diffusion of smart objects and innovative services. While IoT-oriented smart homes can revise how inhabitants interact with the domestic environment, each well-defined piece of technology necessitates precise network performance and distinct levels of security based on the sensitivity of the controlled system and the information it handles. This editorial presents a review of the papers accepted in the special issue. The issue has focused at obtaining high-quality papers aimed at solving well-known technical problems and challenges typical of IoT-oriented smart homes.
Estilos ABNT, Harvard, Vancouver, APA, etc.
23

Batalla, Jordi Mongay, Piotr Krawiec, Mariusz Gajewski e Konrad Sienkiewicz. "ID Layer for Internet of Things Based on Name-Oriented Networking". Journal of Telecommunications and Information Technology, n.º 2 (30 de junho de 2013): 40–48. http://dx.doi.org/10.26636/jtit.2013.2.1215.

Texto completo da fonte
Resumo:
Object and service identification is considered as one of the main challenges in the field of Internet of Things (IoT), which can be solved by the introduction of the so called ID (IDentifier) layer. The objective of this layer is to expose IoT objects and services offered by them, to users. Common approach for ID layer is to create it in overlay manner, on the top of existing network. This paper presents a novel architecture of the ID layer, which is characterized by embedding ID layer functionality into the network plane. Moreover, this approach takes advantage of the Name-Oriented Networking (NON) paradigm. To gain easy access to the IoT objects and services, as well as native support for multicast service, human readable ID-based unified addressing with hierarchical structure was exploited. Additionally, in-network caching of forwarded IoT data, inherited from the NON, helps to reduce total network load and supports applications during collaboration with energy-constrained sensors. Such sensors may enter sleep mode to save energy and then the network nodes can serve requests for sensing data, arrived from applications, by using data stored in nodes’ cache. The paper shows the concept of NON-based ID layer and describes functional architecture of network node paying attention on modules and mechanisms related with ID layer functionality. Primary ID layer processes, i.e., object/service registration, resolution and data forwarding are explained in detail. Moreover, the ID-aware network node was implemented on Linux-based platform and tested to check its forwarding characteristics. The tests showed the performance of the of ID network node in data plane operations, which are the more sensitive for scalability issues.
Estilos ABNT, Harvard, Vancouver, APA, etc.
24

Abbasi, Khurrum Mustafa, Tamim Ahmed Khan e Irfan ul Haq. "Modeling-framework for model-based software engineering of complex Internet of things systems". Mathematical Biosciences and Engineering 18, n.º 6 (2021): 9312–35. http://dx.doi.org/10.3934/mbe.2021458.

Texto completo da fonte
Resumo:
<abstract> <p>Internet of things (IoT) systems are composed of variety of units from different domains. While developing a complete IoT system, different professionals from different domains may have to work in collaboration. In this paper we provide a framework which allows using discrete and continuous time modeling and simulation approaches in combination for IoT systems. The proposed framework demonstrates on how to model Ad-hoc and general IoT systems for software engineering purpose. We demonstrate that model-based software engineering on one hand can provide a common platform to overcome communication gaps among collaborating stakeholders whereas, on the other hand can model and integrate heterogeneous components of IoT systems. While modeling heterogeneous IoT systems, one of the major challenges is to apply continuous and discrete time modeling on intrinsically varying components of the system. Another difficulty may be how to compose these heterogeneous components into one whole system. The proposed framework provides a road-map to model discrete, continuous, Ad-hoc, general systems along with composition mechanism of heterogeneous subsystems. The framework uses a combination of Agent-based modeling, Aspect-oriented modeling, contract-based modeling and services-oriented modeling concepts. We used this framework to model a scenario example of a service-oriented IoT system as proof of concept. We analyzed our framework with existing systems and discussed it in details. Our framework provides a mechanism to model different viewpoints. The framework also enhances the completeness and consistency of the IoT software models.</p> </abstract>
Estilos ABNT, Harvard, Vancouver, APA, etc.
25

Benomar, Zakaria, Francesco Longo, Giovanni Merlino e Antonio Puliafito. "Cloud-based Network Virtualization in IoT with OpenStack". ACM Transactions on Internet Technology 22, n.º 1 (28 de fevereiro de 2022): 1–26. http://dx.doi.org/10.1145/3460818.

Texto completo da fonte
Resumo:
In Cloud computing deployments, specifically in the Infrastructure-as-a-Service (IaaS) model, networking is one of the core enabling facilities provided for the users. The IaaS approach ensures significant flexibility and manageability, since the networking resources and topologies are entirely under users’ control. In this context, considerable efforts have been devoted to promoting the Cloud paradigm as a suitable solution for managing IoT environments. Deep and genuine integration between the two ecosystems, Cloud and IoT, may only be attainable at the IaaS level. In light of extending the IoT domain capabilities’ with Cloud-based mechanisms akin to the IaaS Cloud model, network virtualization is a fundamental enabler of infrastructure-oriented IoT deployments. Indeed, an IoT deployment without networking resilience and adaptability makes it unsuitable to meet user-level demands and services’ requirements. Such a limitation makes the IoT-based services adopted in very specific and statically defined scenarios, thus leading to limited plurality and diversity of use cases. This article presents a Cloud-based approach for network virtualization in an IoT context using the de-facto standard IaaS middleware, OpenStack, and its networking subsystem, Neutron. OpenStack is being extended to enable the instantiation of virtual/overlay networks between Cloud-based instances (e.g., virtual machines, containers, and bare metal servers) and/or geographically distributed IoT nodes deployed at the network edge.
Estilos ABNT, Harvard, Vancouver, APA, etc.
26

Choi, Nakjung, Daewoo Kim, Sung-Ju Lee e Yung Yi. "A Fog Operating System for User-Oriented IoT Services: Challenges and Research Directions". IEEE Communications Magazine 55, n.º 8 (agosto de 2017): 44–51. http://dx.doi.org/10.1109/mcom.2017.1600908.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
27

Crabtree, Andy, Lewis Hyland, James Colley, Martin Flintham, Joel E. Fischer e Hyosun Kwon. "Probing IoT-based consumer services: ‘insights’ from the connected shower". Personal and Ubiquitous Computing 24, n.º 5 (5 de setembro de 2019): 595–611. http://dx.doi.org/10.1007/s00779-019-01303-3.

Texto completo da fonte
Resumo:
Abstract This paper presents findings from the deployment of a technology probe—the connected shower—and implications for the development of ‘living services’ or autonomous context-aware consumer-oriented IoT services that exploit sensing to gain consumer ‘insight’ and drive personalised service innovation. It contributes to the literature on water sustainability and the potential role and barriers to the adoption of smart showers in domestic life. It also contributes to our understanding of context, which enables user activity to be discriminated and elaborated thereby furnishing the ‘insight’ living services require for their successful operation. Problematically, however, our study shows that context is not a property of sensor data. Rather than provide contextual insights into showering, the sensor data requires contextualisation to discriminate and elaborate user activity. Thus, in addition to examining the potential of the connected shower in everyday life, we consider how sensor data is contextualised through the doing of data work and the relevance of its interactional accomplishment and organisation to the design of living services.
Estilos ABNT, Harvard, Vancouver, APA, etc.
28

Zhang, Yang, Bin Fang e Chuanyun Xu. "Preference ontology-oriented metric model for trustworthy Web services". International Journal of Intelligent Systems 26, n.º 2 (22 de novembro de 2010): 158–68. http://dx.doi.org/10.1002/int.20459.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
29

Yan, Yan, Zhi Fang Xu e Xun Zhu. "A Middleware of IoT-Based Smart Home Based on Service". Applied Mechanics and Materials 507 (janeiro de 2014): 182–86. http://dx.doi.org/10.4028/www.scientific.net/amm.507.182.

Texto completo da fonte
Resumo:
This paper presents a Middleware of IoT-based smart home, which based on SOA (Service Oriented Architecture) and overcome the problems of sharing family service information and integrating heterogeneous systems. The middleware tries to form a system framework, which is workable, easily integrated, SOA-based loose coupling and conformed to the standard of family service information exchange. In this framework, the middleware, who plays the role of family service bus, becomes communication component of family service that based on SOA infrastructure, supports services, messaging, and web-based services interaction in heterogeneous environment, finds and discovers required web services through service registration and repository. Each business application distributes loosely coupled based on SOA integration framework, exchanges data and driven events via smart home middleware, provides more good flexibility and faster response for changes of business needs.
Estilos ABNT, Harvard, Vancouver, APA, etc.
30

Wang, Yiming, e Xidan Gong. "Optimization of Data Processing System for Exercise and Fitness Process Based on Internet of Things". Wireless Communications and Mobile Computing 2021 (6 de julho de 2021): 1–11. http://dx.doi.org/10.1155/2021/7132301.

Texto completo da fonte
Resumo:
In the digital network era, people have higher requirements for physical fitness. In the future, physical fitness requires not only good fitness equipment and fitness environment but also more convenient and intelligent health management, service guidance, social entertainment, and other refined fitness services. The innovation of sports and fitness equipment for the digital network era will definitely depend on the development of information technology and network technology. Based on the cutting-edge Internet of Things technology, this thesis focuses on the development and application of a new generation of digital fitness equipment adapted to future development, advocating the new concept of seamless integration of fitness exercise and information services through human-oriented systematic design thinking and providing implementable solutions to realize the science, convenience, and life of public fitness. This thesis uses modern science and technology, especially the Internet of Things (IoT) technology, to fully meet the diversified fitness needs of the fitness crowd as the guide; IoT digital fitness equipment design and application research was newly generated, using a variety of research methods to explore the functional design and application of IoT fitness equipment; the goal is to create a more intelligent and three-dimensional IoT fitness service model in the future. Through the application research of intelligent devices in IoT fitness equipment, the realization of the functions of identity identification, environment perception, and data transmission of IoT fitness equipment is made faster. Intelligent devices can become the interaction channel between fitness service personnel, fitness equipment, and fitness users and also reduce the development cost of IoT fitness equipment. The construction of an IoT fitness cloud service platform and data management system integrates the application of IoT, cloud computing, mobile communication, and other technologies to make IoT fitness service supply remote, real-time, and diversified. While providing convenient and value-added fitness services for fitness people, it also brings sustainable development space for the health service industry.
Estilos ABNT, Harvard, Vancouver, APA, etc.
31

Bao, Jian Min, Jin Ping Wang e Yan Kui Sun. "A New Ubiquitous Service Platform for IOT (USPIOT) Implementation Based on SOA". Advanced Materials Research 524-527 (maio de 2012): 3788–91. http://dx.doi.org/10.4028/www.scientific.net/amr.524-527.3788.

Texto completo da fonte
Resumo:
This paper proposed a new ubiquitous service platform for IOT (USPIOT) implementation based on Service-Oriented Architecture (SOA), the platform combines materialized integration with virtual view and realizes real-time collection, real-time main memory database processing to solve the problem such as real-time heterogeneous data integration of different equipments. By providing a service development environment which enables to realize common services description, the USPIOT makes the various service applications and service operations of the IOT extracted, transformed, integrated, and then establishes a stable ubiquitous service implementation environment. The results show that this platform can realize lots of IOT service applications such as the environmental monitor and has a good scalability.
Estilos ABNT, Harvard, Vancouver, APA, etc.
32

Ahmed, Musa Midila. "Hybrid Encryption for Messages’ Confidentiality in SOSE-Based IOT Service Systems". International Journal of Innovative Computing 11, n.º 2 (31 de outubro de 2021): 1–6. http://dx.doi.org/10.11113/ijic.v11n2.292.

Texto completo da fonte
Resumo:
Internet of Things (IOT) is an essential paradigm where devices are interconnected into network. The operations of these devices can be through service-oriented software engineering (SOSE) principles for efficient service provision. SOSE is an important software development method for flexible, agile, loose-coupled, heterogeneous and interoperable applications. Despite all these benefits, its adoption for IOT services is slow due to security challenges. The security challenge of integration of IOT with service-oriented architecture (SOA) is man-in-the-middle attack on the messages exchanged. The transport layer security (TLS) creates a secured socket channel between the client and server. This is efficient in securing messages exchanged at the transport layer only. SOSE-based IOT systems needs an end-to-end security to handle its vulnerabilities. This integration enables interoperability of heterogeneous devices, but renders the system vulnerable to passive attacks. The confidentiality problem is hereby addressed by message level hybrid encryption. This is by encrypting the messages by AES for efficiency. However, to enable end-to-end security, the key sharing problem of advanced encryption standard (AES) is handled by RSA public key encryption. The results shows that this solution addressed data contents security and credentials security privacy issues. Furthermore, the solution enables end-to- end security of interaction in SOSE-based IOT systems.
Estilos ABNT, Harvard, Vancouver, APA, etc.
33

Ghobadi, Hossein, Paola Testa, Luca Spogli, Massimo Cafaro, Lucilla Alfonsi, Vincenzo Romano e Richard Bru. "User-Oriented ICT Cloud Architecture for High-Accuracy GNSS-Based Services". Sensors 19, n.º 11 (11 de junho de 2019): 2635. http://dx.doi.org/10.3390/s19112635.

Texto completo da fonte
Resumo:
We introduce a new information and communication technology (ICT) cloud-based architecture for Global Navigation Satellite System (GNSS) high-accuracy solutions, offering also a commercial overview of GNSS downstream market to show how the developed innovation is thought to fit in the real context. The designed architecture is featured by dynamic scalability, increased integrity, and greater agility of the ICT system. The novelty of the solution developed is a customized ICT architecture, obtained through unique and privileged access to user communities in the frame of the H2020 project TREASURE, allowing the development of a solution entirely driven by user needs. The economic outlook of GNSS downstream markets evolution highlights how the technology proposed effectively matches the evolving business environment, specifically in regard to the increasing need for flexibility and competitive advantage deriving from services. The simultaneous adoption of the technical and commercial perspective is meant to offer interesting findings to both the scientific community and GNSS industry, creating synergies previously unexplored.
Estilos ABNT, Harvard, Vancouver, APA, etc.
34

Beştepe, Fırat, e Sevgi Özkan Yildirim. "Acceptance of IoT-based and sustainability-oriented smart city services: A mixed methods study". Sustainable Cities and Society 80 (maio de 2022): 103794. http://dx.doi.org/10.1016/j.scs.2022.103794.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
35

Shokrollahi, Saeed, e Fereidoon Shams. "Rich Device-Services (RDS): A Service-Oriented Approach to the Internet of Things (IoT)". Wireless Personal Communications 97, n.º 2 (8 de agosto de 2017): 3183–201. http://dx.doi.org/10.1007/s11277-017-4669-2.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
36

Afzal, Ayesha, Basit Shafiq, Shafay Shamail e Nabil Adam. "Requirements modeling of Web services-based business processes". Business Process Management Journal 26, n.º 6 (26 de maio de 2020): 1401–24. http://dx.doi.org/10.1108/bpmj-08-2019-0322.

Texto completo da fonte
Resumo:
PurposeThis paper reviews existing business process (BP) modeling languages that are widely used in the industry as well as recent research work on modeling and analysis of BPs in the service-oriented environment and Internetware-based software paradigm. BPs in such environment are different from traditional BPs due to loose coupling of partner services, dynamic and on-the-fly selection of partners and run-time process adaptability. The unique characteristics of these BPs require formal modeling of the requirements and constraints in each phase of their life cycle, including design phase, implementation and deployment phase and execution phase.Design/methodology/approachThe paper first provides a categorization of typical user requirements in each phase of the BP life cycle. Then a detailed comparison of the selected languages with respect to their requirement modeling and analysis capabilities in each of the identified categories is provided. The paper also discusses new requirements engineering research challenges arising from future software needs and emerging trends in software engineering in the context of Web-services-based BPs and Internetware.FindingsThere is a need to have a framework that provides support for user requirements modeling and analysis for all the phases of BP life cycle in an integrated manner. Such a framework would be useful not only in resolving the inconsistencies between requirements across phases but also in addressing the issues related to BP evolution due to changes in user requirements over time. Moreover, with the Internet of things (IoT) adoption in BPM, there is a need to have an integrated environment that provides support for capturing the resilience requirements of enterprise BPs as well as the mobility constraints of the underlying IoT devices.Originality/valueThis paper reviews existing BP modeling languages and frameworks and discusses the new requirements engineering research challenges arising from future software needs and the emerging trends in BP management in the service-oriented environment and Internetware-based software paradigm.
Estilos ABNT, Harvard, Vancouver, APA, etc.
37

Zou, Yiqin, e Li Quan. "A new service-oriented grid-based method for AIoT application and implementation". Modern Physics Letters B 31, n.º 19-21 (27 de julho de 2017): 1740064. http://dx.doi.org/10.1142/s0217984917400644.

Texto completo da fonte
Resumo:
The traditional three-layer Internet of things (IoT) model, which includes physical perception layer, information transferring layer and service application layer, cannot express complexity and diversity in agricultural engineering area completely. It is hard to categorize, organize and manage the agricultural things with these three layers. Based on the above requirements, we propose a new service-oriented grid-based method to set up and build the agricultural IoT. Considering the heterogeneous, limitation, transparency and leveling attributes of agricultural things, we propose an abstract model for all agricultural resources. This model is service-oriented and expressed with Open Grid Services Architecture (OGSA). Information and data of agricultural things were described and encapsulated by using XML in this model. Every agricultural engineering application will provide service by enabling one application node in this service-oriented grid. Description of Web Service Resource Framework (WSRF)-based Agricultural Internet of Things (AIoT) and the encapsulation method were also discussed in this paper for resource management in this model.
Estilos ABNT, Harvard, Vancouver, APA, etc.
38

Zhu, Da, Yang Zhang, Bo Cheng e Jun Liang Chen. "An Event-Driven SOA Based Service Integration Framework for Provision of Active Services". Applied Mechanics and Materials 135-136 (outubro de 2011): 1159–67. http://dx.doi.org/10.4028/www.scientific.net/amm.135-136.1159.

Texto completo da fonte
Resumo:
The tendency of future communication network is to set up an environment supporting network convergence as well as dynamic service collaboration. The recent Internet of Things (IoT) visions makes provision of User-Centric and active service to common users an important aim. Service-Oriented Architecture (SOA) based on Web service technology works well for provision of request/response style passive service. However, services and devices in IoT or mobile environment may dynamically interact and cause a considerable amount of states changes, which calls for an active and more flexible framework to enable interactive service provision. In this paper we propose an Event-driven SOA based service integration framework (EDSIF) for provision of active service. Compared with traditional SOA based service provision method, this approach will facilitate real-time event processing as well as intelligent service coordination. We present the concept model of Event-driven SOA and the key components of EDSIF. We also illustrate the ECA4IoS rules for active service execution and the enhancement work of WSN broker towards an effective EDSIF.
Estilos ABNT, Harvard, Vancouver, APA, etc.
39

Sun, Jian, Guanhua Huang, Arun Kumar Sangaiah, Guangyang Zhu e Xiaojiang Du. "Towards Supporting Security and Privacy for Social IoT Applications: A Network Virtualization Perspective". Security and Communication Networks 2019 (14 de março de 2019): 1–15. http://dx.doi.org/10.1155/2019/4074272.

Texto completo da fonte
Resumo:
Network function virtualization (NFV) is a new way to provide services to users in a network. Different from dedicated hardware that realizes the network functions for an IoT application, the network function of an NFV network is executed on general servers, and in order to achieve complete network functions, service function chaining (SFC) chains virtual network functions to work together to support an IoT application. In this paper, we focus on a main challenge in this domain, i.e., resource efficient provisioning for social IoT application oriented SFC requests. We propose an online SFC deployment algorithm based on the layered strategies of physical networks and an evaluation of physical network nodes, which can efficiently reduce bandwidth resource consumption (OSFCD-LSEM) and support the security and privacy of social IoT applications. The results of our simulation show that our proposed algorithm improves the bandwidth carrying rate, time efficiency, and acceptance rate by 50%, 60%, and 15%, respectively.
Estilos ABNT, Harvard, Vancouver, APA, etc.
40

Aguru, Aswani Devi, Erukala Suresh Babu, Soumya Ranjan Nayak, Abhisek Sethy e Amit Verma. "Integrated Industrial Reference Architecture for Smart Healthcare in Internet of Things: A Systematic Investigation". Algorithms 15, n.º 9 (29 de agosto de 2022): 309. http://dx.doi.org/10.3390/a15090309.

Texto completo da fonte
Resumo:
Internet of Things (IoT) is one of the efflorescing technologies of recent years with splendid real-time applications in the fields of healthcare, agriculture, transportation, industry, and environmental monitoring. In addition to the dominant applications and services of IoT, many challenges exist. As there is a lack of standardization for IoT technologies, the architecture emerged as the foremost challenge. The salient issues in designing an IoT architecture encompass connectivity, data handling, heterogeneity, privacy, scalability, and security. The standard IoT architectures are the ETSI IoT Standard, the ITU-T IoT Reference Model, IoT-A Reference Model, Intel’s IoT Architecture, the Three-Layer Architecture, Middle-Based Architecture, Service-Oriented Architecture, Five-Layer Architecture, and IWF Architecture. In this paper, we have reviewed these architectures and concluded that IWF Architecture is most suitable for the effortless development of IoT applications because of its immediacy and depth of insight in dealing with IoT data. We carried out this review concerning smart healthcare as it is among the major industries that have been leaders and forerunners in IoT technologies. Motivated by this, we designed the novel Smart Healthcare Reference Architecture (SHRA) based on IWF Architecture. Finally, present the significance of smart healthcare during the COVID-19 pandemic. We have synthesized our findings in a systematic way for addressing the research questions on IoT challenges. To the best of our knowledge, our paper is the first to provide an exhaustive investigation on IoT architectural challenges with a use case in a smart healthcare system.
Estilos ABNT, Harvard, Vancouver, APA, etc.
41

Azzedin, Farag, e Turki Alhazmi. "Secure Data Distribution Architecture in IoT Using MQTT". Applied Sciences 13, n.º 4 (15 de fevereiro de 2023): 2515. http://dx.doi.org/10.3390/app13042515.

Texto completo da fonte
Resumo:
Message Queuing Telemetry Transport (MQTT) is one of the standard application layer protocols for the Internet of Things. It uses a publish/subscribe mechanism which organizes a set of clients around a server called the broker, which delivers published data to its intended recipients. This article proposes an architecture that allows MQTT brokers to cooperate and share their data with other interested MQTT brokers. It is a service-oriented architecture that wraps an MQTT broker with a well defined WebSockets-based interface which allows it to offer its topic space and published data to other MQTT brokers. The wrapped MQTT broker is called a broker service, and it discovers other broker services through a discovery service. Each broker service only connects to services that have data its clients are interested. Furthermore, these services are authenticated by obtaining tokens from an authentication service that registers and issues JSON Web Tokens for them. These tokens contain the identity and claims of their owners and they can be verified without contacting the authentication service. The proposed architecture simplifies data sharing and improves the security in scenarios with multiple MQTT brokers where clients can move between them. In these scenarios, the MQTT brokers need to obtain data based on their clients interests, which are constantly changing. It does so by isolating MQTT brokers into services that can be discovered and consumed over well-defined interfaces. The architecture was implemented in javascript using MQTT 3.1.1 standard complaint library. We demonstrate the performance characteristics of our architecture using our implementation through three scenarios, which are designed to compare the delay from publisher to subscriber when they operate within the same MQTT broker and different MQTT brokers. The results show that the overhead of our architecture is around 50% in two synthetic scenarios (performed on a single machine) and around 27% in a third scenario performed on the cloud with multiple virtual machines hosting the broker services and simulated clients.
Estilos ABNT, Harvard, Vancouver, APA, etc.
42

Kodati, Sarangam, Kumbala Pradeep Reddy, Thotakura Veerananna, S. Govinda Rao e G. Anil Kumar. "Security Framework Connection Assistance for IoT Device Secure Data communication". E3S Web of Conferences 309 (2021): 01061. http://dx.doi.org/10.1051/e3sconf/202130901061.

Texto completo da fonte
Resumo:
Today, Internet of Things (IoT) services has been increasing extensively because of their optimum device sizes and their developed network infrastructure that includes devices based on internet embedded with various sensors, actuators, communication, and storage components providing connection and data exchange. Presently number of industries use vast number of IoT devices, there are some challenges like reducing the risks and threats that exposure, accommodating the huge number of IoT devices in network and providing secure vulnerabilities have risen. Supervised learning has recently been gaining popularity to provide device classification. But this supervised learning became unrealistic as producing millions of new IoT devices each year, and insufficient training data. In this paper, security framework connection assistance for IoT device secured data communication is proposed. A multi-level security support architecture which combines clustering technique with deep neural networks for designing the resource oriented IoT devices with high security and these are enabling both the seen and unseen device classification. The datasets dimensions are reduced by considering the technique as auto encoder. Therefore in between accuracy and overhead classification good balancing is established. The comparative results are describes that proposed security system is better than remaining existing systems.
Estilos ABNT, Harvard, Vancouver, APA, etc.
43

Arnaoutoglou, Dimitrios G., Tzichat M. Empliouk, Theodoros N. F. Kaifas, Michael T. Chryssomallis e George Kyriacou. "A Review of Multifunctional Antenna Designs for Internet of Things". Electronics 13, n.º 16 (13 de agosto de 2024): 3200. http://dx.doi.org/10.3390/electronics13163200.

Texto completo da fonte
Resumo:
The Internet of Things (IoT) envisions the interconnection of all electronic devices, ushering in a new technological era. IoT and 5G technology are linked, complementing each other in a manner that significantly enhances their impact. As sensors become increasingly embedded in our daily lives, they transform everyday objects into “smart” devices. This synergy between IoT sensor networks and 5G creates a dynamic ecosystem where the infrastructure provided by 5G’s high-speed, low-latency communication enables IoT devices to function more efficiently and effectively, paving the way for innovative applications and services that enhance our awareness and interactions with the world. Moreover, application-oriented and multifunctional antennas need to be developed to meet these high demands. In this review, a comprehensive analysis of IoT antennas is conducted based on their application characteristics. It is important to note that, to the best of our knowledge, this is the first time that this categorization has been performed in the literature. Indeed, comparing IoT antennas across different applications without considering their specific operational contexts is not practical. This review focuses on four primary operational fields: smart homes, smart cities, and biomedical and implantable devices.
Estilos ABNT, Harvard, Vancouver, APA, etc.
44

Aravind, K., e Praveen Kumar Reddy Maddikunta. "Multiobjectives for Optimal Geographic Routing in IoT Health Care System". Complexity 2022 (10 de maio de 2022): 1–15. http://dx.doi.org/10.1155/2022/7568804.

Texto completo da fonte
Resumo:
In numerous internet of things (IoT) appliances, messages might require to be distributed to certain specified nodes or objects with the multicast transmission. “The multicast routing protocol can be divided into nongeographic based and geographic based.” As locations of device are roughly extracted by GPS devices, geographic-oriented multicast routing schemes were chosen, because it induces lesser overheads. Nevertheless, the extant geographic-oriented routing models are found to have particular disadvantages. After the advent of the IoT systems for remote healthcare, medical services can be rapidly provided to patients in rural areas. The IoT network encapsulates flexible sensors in the environment to collect environmental information. This gathered sensor information is sent to the nursing stations for timely medical assistance. The IoT network is wireless, which leads to security breaches. Therefore, there is a necessity to have a secured data transmission in the context of healthcare. Hence, this study intends to propose a novel optimal route selection model in IoT healthcare by deploying optimized ANFIS. Here, the optimal routes for medical data are selected using a new self-adaptive jellyfish search optimizer (SA-JSO) that is the enhanced edition of the extant JSO model. Accordingly, the optimal route selection for medical data is performed under the consideration of “energy, distance, delay, overhead, trust, quality of service (QoS), and security (high risk, low risk, and medium risk).” In the end, the performances of adopted work are compared and proved over other extant schemes.
Estilos ABNT, Harvard, Vancouver, APA, etc.
45

Khemaja, Maha, e Taoufik Mastour. "Skill oriented Training Activity as a Service". International Journal of Human Capital and Information Technology Professionals 5, n.º 4 (outubro de 2014): 55–78. http://dx.doi.org/10.4018/ijhcitp.2014100104.

Texto completo da fonte
Resumo:
In this paper, the authors address the problem of fast changing Information and Communication Technology (ICT) profession which hampers efficiency of ICT professionals and practitioners as well as businesses. For instance, ICT practitioners increasingly need support and training activitie to adapt their skills or to acquire new ones in order to deal with ICT technology changes. The authors attempt for that aim to provide a generic training Framework based on Intelligent Tutoring Systems' configuration and adaptation to ICT professionals and practitioners needs. In this framework, the Intelligent Tutoring System's components are e-skill oriented training services using corresponding resources all together deployed in the cloud accordingly to a Software as a Service model. More specifically, they proposed Framework adopts the European e-Competence Framework, the European Qualification Framework as well as the Instructional Management System portfolio standard.
Estilos ABNT, Harvard, Vancouver, APA, etc.
46

Supriadi, Dedi, e Udin Syaefudin Sa’ud. "THE EFFECTIVENESS OF IMPLEMENTING INFORMATION AND COMMUNICATION TECHNOLOGY ON STUDENT ACADEMIC SERVICES (A Case Study in Bandung Institute of Technology for the 2015-2016 Period)". International Journal of Education 9, n.º 2 (24 de fevereiro de 2017): 139. http://dx.doi.org/10.17509/ije.v9i2.5478.

Texto completo da fonte
Resumo:
The implementation of Information and Communication Technology (ICT) in higher education institutions plays an important role in realizing the competitive advantage, especially in the realization of the three pillars of higher education. In order for the implementation of ICT in higher education institutions to be effective, adequate support from infrastructure, human resources, and leader and organizational commitment is needed. The research focuses on and aims to describe the effectiveness of ICT implementation in student academic services, covering ICT policies and programs, ICT implementation strategies, ICT implementation, and the effectiveness of ICT implementation in student academic services. In addition, it attempts to formulate a hypothetical model of ICT implementation in student academic services. The research adopted the analytical-descriptive method through qualitative approach. Data were collected through interviews, observations, and documentary analysis. Afterwards, the data were analyzed through data reduction, data display, inference drawing, and verification. The research took place in Bandung Institute of Technology. The findings show that: The ICT policies and programs are based on the implementation of the three pillars of higher education (education, research, and community service); the strategies give emphasis on coordination patterns; ICT implementation in academic services is realized through e-learning (online, blended learning, video conference), academic information system, and digital library; the effectiveness of the ICT implementation is analyzed based on the realization of the program at the level of unit (decision-focused approach), performance achievement (goal-oriented approach), and student satisfaction (user-oriented approach) in terms of tangibles, reliability, responsiveness, assurance, and empathy. It is recommended that ICT implementation in academic services should be able to realize the competitive advantage of the implementation of the three pillars of higher education, which is in accordance with the institution’s vision, missions, and strategic goals, supported by the availability of infrastructure, human resources, funds, managerial and organizational commitment, and periodical evaluation and monitoring.
Estilos ABNT, Harvard, Vancouver, APA, etc.
47

Zhang, Mingyuan, Shiyong Chen, Zihao Wei e Yucheng Wu. "Preference-Matched Multitask Assignment for Group Socialization under Mobile Crowdsensing". Sensors 23, n.º 4 (17 de fevereiro de 2023): 2275. http://dx.doi.org/10.3390/s23042275.

Texto completo da fonte
Resumo:
Mobile crowdsensing (MCS) has been an emerging sensing paradigm in recent years, which uses a sensing platform for real-time processing to support various services for the Internet of Things (IoT) and promote the development of IoT. As an important component of MCS, how to design task assignment algorithms to cope with the coexistence of multiple concurrent heterogeneous tasks in group-oriented social relationships while satisfying the impact of users’ preferences on heterogeneous multitask assignment and solving the preference matching problem under heterogeneous tasks, is one of the most pressing issues. In this paper, a new algorithm, group-oriented adjustable bidding task assignment (GO-ABTA), is considered to solve the group-oriented bilateral preference-matching problem. First, the initial leaders and their collaborative groups in the social network are selected by group-oriented collaboration, and then the preference assignment of task requesters and users is modeled as a stable preference-matching problem. Then, a tunable bidding task assignment process is completed based on preference matching under budget constraints. Finally, the individual reasonableness, stability, and convergence of the proposed algorithm are demonstrated. The effectiveness of the proposed algorithm and its superiority to other algorithms are verified by simulation results.
Estilos ABNT, Harvard, Vancouver, APA, etc.
48

Khan, Habib Ullah, Anwar Hussain, Shah Nazir, Farhad Ali, Muhammad Zubair Khan e Inam Ullah. "A Service-Efficient Proxy Mobile IPv6 Extension for IoT Domain". Information 14, n.º 8 (14 de agosto de 2023): 459. http://dx.doi.org/10.3390/info14080459.

Texto completo da fonte
Resumo:
The upcoming generation of communications can provide richer mobility, high data rate, reliable security, better quality of services, and supporting mobility requirements in the Internet of Things (IoT) environment. Integrating modern communication with IoT demands more secure, scalable, and resource-efficient mobility solutions for better business opportunities. In a massive 6G-enabled IoT environment, modern mobility solutions such as proxy mobile IPv6 (PMIPv6) have the potential to provide enhanced mobility and resource efficiency. For supporting richer mobility, a cost-effective and resource-efficient mobility solution is required in a massive 6G-enabled IoT environment. The main objective of the presented study is to provide a resource-friendly mobility solution for supporting the effective integration of future communication in the massive IoT domain. In that context, a location-based, resource-efficient PMIPv6 extension protocol is proposed to provide resource efficiency in terms of required signaling, packet loss, and handover latency. To compare and analyze the proposed model’s effectiveness, mathematical equations are derived for the existing as well as for the proposed solution, and such equations are implemented. Based on the comparison among existing and proposed solutions, the results show that the proposed location-based service-oriented proxy mobile IPv6 extension is resource efficient for supporting mobility in 6G-enabled IoT.
Estilos ABNT, Harvard, Vancouver, APA, etc.
49

Bin-Faisal, Sajid, Dip Nandi e Mashiour Rahman. "Dual Layer Encryption for IoT based Vehicle Systems over 5G Communication". International Journal of Information Technology and Computer Science 14, n.º 2 (8 de abril de 2022): 17–30. http://dx.doi.org/10.5815/ijitcs.2022.02.02.

Texto completo da fonte
Resumo:
In modern communication scenario of the 5G era, the service quality is the greatest concern for the users. Also, the concept of security can’t be neglected in this case. In the IoT oriented services like vehicle and VANET systems, the security in the presentation layer of the network is required. This work is over the security mechanism of the service storage and fetching the files for service. A new scheme of multi layered file and content encryption has been produced in order to strengthen the security of the file and data to maintain integrity and confidentiality of the IoT enabled services implemented in 5G. The encryption scheme is designed for the password encryption through asymmetric key cryptography (RSA) along with an enhanced concern of internal content or data security with symmetric key (AES-128) cryptography. This encryption system of double layer for a file makes the study unique and differentiable than other security schemes.
Estilos ABNT, Harvard, Vancouver, APA, etc.
50

Ahmed, Abdelmuttlib Ibrahim Abdalla, Siti Hafizah Ab Hamid, Abdullah Gani, Ahmed Abdelaziz e Mohammed Abaker. "Formal Analysis of Trust and Reputation for Service Composition in IoT". Sensors 23, n.º 6 (16 de março de 2023): 3192. http://dx.doi.org/10.3390/s23063192.

Texto completo da fonte
Resumo:
The exponential growth in the number of smart devices connected to the Internet of Things (IoT) that are associated with various IoT-based smart applications and services, raises interoperability challenges. Service-oriented architecture for IoT (SOA-IoT) solutions has been introduced to deal with these interoperability challenges by integrating web services into sensor networks via IoT-optimized gateways to fill the gap between devices, networks, and access terminals. The main aim of service composition is to transform user requirements into a composite service execution. Different methods have been used to perform service composition, which has been classified as trust-based and non-trust-based. The existing studies in this field have reported that trust-based approaches outperform non-trust-based ones. Trust-based service composition approaches use the trust and reputation system as a brain to select appropriate service providers (SPs) for the service composition plan. The trust and reputation system computes each candidate SP’s trust value and selects the SP with the highest trust value for the service composition plan. The trust system computes the trust value from the self-observation of the service requestor (SR) and other service consumers’ (SCs) recommendations. Several experimental solutions have been proposed to deal with trust-based service composition in the IoT; however, a formal method for trust-based service composition in the IoT is lacking. In this study, we used the formal method for representing the components of trust-based service management in the IoT, by using higher-order logic (HOL) and verifying the different behaviors in the trust system and the trust value computation processes. Our findings showed that the presence of malicious nodes performing trust attacks leads to biased trust value computation, which results in inappropriate SP selection during the service composition. The formal analysis has given us a clear insight and complete understanding, which will assist in the development of a robust trust system.
Estilos ABNT, Harvard, Vancouver, APA, etc.
Oferecemos descontos em todos os planos premium para autores cujas obras estão incluídas em seleções literárias temáticas. Contate-nos para obter um código promocional único!

Vá para a bibliografia