A Spatial Architecture Model of Internet of Things Based on Triangular Pyramid

Author(s):  
Weidong Fang ◽  
Lianhai Shan ◽  
Zhidong Shi ◽  
Guoqing Jia ◽  
Xin Wang
2014 ◽  
Vol 533 ◽  
pp. 460-465
Author(s):  
Xiao Yang Liang ◽  
Lin Zhang

This paper proceeds as follow, the architecture model based on cloud storage and cloud storage of key technologies, from the availability, reliability and data sharing three aspects analysis the feasibility of the combination of cloud storage and Internet of things, cloud storage are discussed under the Internet environment facing security problems and the corresponding solutions and Internet of things under the environment of cloud storage platform structure model, and the cloud storage in the Internet of the future development trend is prospected.


2021 ◽  
Vol 2021 ◽  
pp. 1-11
Author(s):  
Min Qi ◽  
Junshu Wang

This paper builds an intelligent E-Government platform based on the Internet of Things. It adopts a three-layer architecture model, including the government collection layer, the government network layer, and the government application layer. By making full use of data technology and information technology, government services can be realized in real-time perception, efficient operation, scientific decision-making, active service, and intelligent supervision and can be open and collaborative, so as to provide the public with better quality and more efficient and more responsive government services. In addition, this paper has realized optimization in the aspects of government service mode, Internet of Things application mode, and database structure. Through the use of big data technology, the government service information will be digitized and integrated, and through the data sharing and exchange platform, the government information resources will be intercommunicated and shared across departments, levels, and regions. The application mode has been upgraded. Compared with the traditional E-Government, the government has made a qualitative leap in the degree of automation of control, the intelligence of service and decision, the remote support ability, and the space-time scope that government can control. The distributed management mode of the SQL Server is adopted to realize the exchange of requested data and process the data content, which can greatly improve the working efficiency of the system. Finally, through testing, the government affairs management system has good stability; there is no congestion and delay when multiple users access the system, so the response speed and efficiency of the system basically meet the requirements.


Systems ◽  
2021 ◽  
Vol 9 (2) ◽  
pp. 21
Author(s):  
Christoph Binder ◽  
Christian Neureiter ◽  
Arndt Lüder

Contemporary manufacturing systems are undergoing a major change promoted by emerging technologies such as Cyber-physical Systems (CPS) or the Internet of Things (IoT). This trend, nowadays widely known by the term “Industry 4.0”, leads to a new kind of automated production. However, the rising number of dynamically interconnected elements in industrial production lines results in such a system being transformed into a complex System of Systems (SoS). Due to the increasing complexity and the challenges accompanied by this change, conventional engineering methods using generic principles reach their limits when developing this type of systems. With varying approaches only trying to find a solution for small-scaled areas of this problem statement, the need for a holistic methodology becomes more and more obvious. Having recognized this issue, one of the most promising approaches has been introduced with the Reference Architecture Model Industry 4.0 (RAMI 4.0). However, in the current point of view, this domain-specific architecture framework is missing specifications to address all aspects of such a critical infrastructure. Thus, this paper introduces a comprehensive modeling approach utilizing methods applied in Model-Based Systems Engineering (MBSE) and including domain-specific particularities as well as architectural concepts with the goal to enable mutual engineering of current and future industrial systems. The resulting artifacts, a domain-specific language (DSL), an architecture definition and a development process, are thereby consolidated in a ready to use software framework, whose applicability was evaluated by a real-world case study.


Author(s):  
B. Baranidharan

Internet of things (IoT) is a rapidly developing technology that connects various kinds of smart miniature things such as smart medical alert watches, smart vehicles, smart phones, smart running shoes, etc. Smart devices are connected through internet and can communicate to other smart devices in any part of the world in an automated manner. IoT environment often uses constrained devices with low energy, low processing capability, and low memory space. In order to prevent communication failure, a special kind of architecture is needed for IoT. This chapter presents a review of the basic architecture model, communication protocol of IoT, security aspects of IoT, and various IoT applications such as smart agriculture, water management, smart healthcare, smart home, smart industry, and smart vehicles.


2016 ◽  
Vol 64 (9) ◽  
Author(s):  
Reinhard Herzog ◽  
Michael Jacoby ◽  
Ivana Podnar Žarko

AbstractThe paper analyses and compares the different approaches to achieve semantic interoperability of the most influential IoT reference architectures, namely the Industrial Internet Reference Architecture, Reference Architecture Model Industrie 4.0, ISO/IEC Internet of Things Reference Architecture, the Internet of Things – Architecture (IoT-A) and oneM2M functional architecture.


Author(s):  
Dmitry G. Korzun ◽  
Alexander V. Borodin ◽  
Ilya V. Paramonov ◽  
Andrey M. Vasilyev ◽  
Sergey I. Balandin

The article studies the smart spaces approach applied for development of mobile healthcare (m-Health) services deploying in Internet of Things (IoT) environments. The authors consider a reference architecture model of the service ecosystem with focus on intelligent utilization of multi-source data originated from the IoT environment. Based on the architecture the authors introduce two reference scenarios: assistance in providing the first aid and communication with the hospital information system. For the architectural model and the scenarios pilot implementations are developed on the open source Smart-M3 platform.


2018 ◽  
Vol 28 (4) ◽  
pp. 68-75
Author(s):  
N. V. Evglevskaya ◽  
A. I. Paramonov ◽  
P. I. Smirnov ◽  
R. V. Shamilova

The study has the method of random multiple wireless access in the networks of the Internet of Things and the control architecture, similar to a software-configured network, examined. The models of collision description, network parameters selection and their initial values, which provide target values for the probability of the delivery in the considered networks, are analyzed. The paper proposes a method the novelty of which lies in the usage of cognitive control of network parameters, taking into account the heterogeneity of conditions for different users with a given probability of data delivery. The proposed method and model of random multiple access and cognitive selection of network parameters are relevant and can be applied when building the access level of the Internet of Things in networks with allowable losses when managing large volumes of heterogeneous traffic and ensuring the required quality of service.


Computers ◽  
2020 ◽  
Vol 9 (2) ◽  
pp. 44 ◽  
Author(s):  
Muath A. Obaidat ◽  
Suhaib Obeidat ◽  
Jennifer Holst ◽  
Abdullah Al Hayajneh ◽  
Joseph Brown

The Internet of Things (IoT) has experienced constant growth in the number of devices deployed and the range of applications in which such devices are used. They vary widely in size, computational power, capacity storage, and energy. The explosive growth and integration of IoT in different domains and areas of our daily lives has created an Internet of Vulnerabilities (IoV). In the rush to build and implement IoT devices, security and privacy have not been adequately addressed. IoT devices, many of which are highly constrained, are vulnerable to cyber attacks, which threaten the security and privacy of users and systems. This survey provides a comprehensive overview of IoT in regard to areas of application, security architecture frameworks, recent security and privacy issues in IoT, as well as a review of recent similar studies on IoT security and privacy. In addition, the paper presents a comprehensive taxonomy of attacks on IoT based on the three-layer architecture model; perception, network, and application layers, as well as a suggestion of the impact of these attacks on CIA objectives in representative devices, are presented. Moreover, the study proposes mitigations and countermeasures, taking a multi-faceted approach rather than a per layer approach. Open research areas are also covered to provide researchers with the most recent research urgent questions in regard to securing IoT ecosystem.


Sign in / Sign up

Export Citation Format

Share Document