scholarly journals Secure transmission technique for data in IoT edge computing infrastructure

Author(s):  
Rohit Sharma ◽  
Rajeev Arya

AbstractNowadays, the utilization of IoT technology has been rapidly increased in various applications such as smart city, smart banking, smart transport, etc. The internet of things allows the user to collect the data easily using the different sensors installed at various locations in the open environment. The data collection process by the IoT sensors is giving access to the various services. However, due to the open communication medium, it is difficult to provide secure access to these services. In this paper, a data transmission technique has been proposed, which will provide secure communication in IoT infrastructure for smart city applications. In this method, each IoT sensor have to prove their legitimacy to the reader and the base station before the transmission of data. Hence, the IoT sensors can transmit the required data in a secure and efficient way. In the proposed technique, the proof of correction shows that the required information is not supposed to send through an online medium, it is obtained at the receiver using the Euclidean parameters shared by the IoT sensors. The proposed technique is compatible to provide the security against most of the attacks performed by the attackers. Two random variables and complex mathematical calculation are making the proposed technique more reliable than others. This technique will significantly improve the security of different data transmission services which will be helpful to improve the smart city infrastructure.

Author(s):  
Deena Nath Gupta ◽  
Rajendra Kumar ◽  
Ashwani Kumar

A secure environment is needed to communicate without any information leakage. From large devices having UPS to small devices having a battery, the parameter about security changes over time. Researchers need to work in three basics of security: (1) Mutual authentication between devices, (2) Strong encryption methodology for transmission, and (3) Secure storage environment with anytime availability. The IoT-enabled devices demand a lightweight secure environment. In this chapter, authors are concerning on all three points, i.e. Mutual authentication between devices, Strong encryption methodology for transmission, and Secure storage environment with anytime availability. Authors study some of the methods related to lightweight mutual authentication, lightweight cryptography, and local storage techniques; will talk about different issues in the field of secure communication, secure transmission, and secure storage; and will try to find out some research gap with a possible countermeasure.


2021 ◽  
Vol 2021 ◽  
pp. 1-11
Author(s):  
C. Jothikumar ◽  
Kadiyala Ramana ◽  
V. Deeban Chakravarthy ◽  
Saurabh Singh ◽  
In-Ho Ra

The Internet of Things grew rapidly, and many services, applications, sensor-embedded electronic devices, and related protocols were created and are still being developed. The Internet of Things (IoT) allows physically existing things to see, hear, think, and perform a significant task by allowing them to interact with one another and exchange valuable knowledge when making decisions and caring out their vital tasks. The fifth-generation (5G) communications require that the Internet of Things (IoT) is aided greatly by wireless sensor networks, which serve as a permanent layer for it. A wireless sensor network comprises a collection of sensor nodes to monitor and transmit data to the destination known as the sink. The sink (or base station) is the endpoint of data transmission in every round. The major concerns of IoT-based WSNs are improving the network lifetime and energy efficiency. In the proposed system, Optimal Cluster-Based Routing (Optimal-CBR), the energy efficiency, and network lifetime are improved using a hierarchical routing approach for applications on the IoT in the 5G environment and beyond. The Optimal-CBR protocol uses the k-means algorithm for clustering the nodes and the multihop approach for chain routing. The clustering phase is invoked until two-thirds of the nodes are dead and then the chaining phase is invoked for the rest of the data transmission. The nodes are clustered using the basic k-means algorithm during the cluster phase and the highest energy of the node nearest to the centroid is selected as the cluster head (CH). The CH collects the packets from its members and forwards them to the base station (BS). During the chaining phase, since two-thirds of the nodes are dead and the residual energy is insufficient for clustering, the remaining nodes perform multihop routing to create chaining until the data are transmitted to the BS. This enriches the energy efficiency and the network lifespan, as found in both the theoretical and simulation analyses.


Author(s):  
P. Jeyadurga ◽  
S. Ebenezer Juliet ◽  
I. Joshua Selwyn ◽  
P. Sivanisha

The Internet of things (IoT) is one of the emerging technologies that brought revolution in many application domains such as smart cities, smart retails, healthcare monitoring and so on. As the physical objects are connected via internet, security risk may arise. This paper analyses the existing technologies and protocols that are designed by different authors to ensure the secure communication over internet. It additionally focuses on the advancement in healthcare systems while deploying IoT services.


2021 ◽  
pp. 1-13 ◽  
Author(s):  
Bhabendu Kumar Mohanta ◽  
Debasish Jena ◽  
Niva Mohapatra ◽  
Somula Ramasubbareddy ◽  
Bharat S. Rawal

Smart city has come a long way since the development of emerging technology like Information and communications technology (ICT), Internet of Things (IoT), Machine Learning (ML), Block chain and Artificial Intelligence. The Intelligent Transportation System (ITS) is an important application in a rapidly growing smart city. Prediction of the automotive accident severity plays a very crucial role in the smart transportation system. The main motive behind this research is to determine the specific features which could affect vehicle accident severity. In this paper, some of the classification models, specifically Logistic Regression, Artificial Neural network, Decision Tree, K-Nearest Neighbors, and Random Forest have been implemented for predicting the accident severity. All the models have been verified, and the experimental results prove that these classification models have attained considerable accuracy. The paper also explained a secure communication architecture model for secure information exchange among all the components associated with the ITS. Finally paper implemented web base Message alert system which will be used for alert the users through smart IoT devices.


2021 ◽  
pp. 2141007
Author(s):  
Mengyi Lian ◽  
Xiaowei Liu

Building information modeling (BIM) is one of the most exciting recent construction, engineering, and architecture developments. Built environments play a significant role in Smart City worldwide, and they are used to convey useful information to achieve smart city strategic goals. In modern project management, optimizing resources, BIM data integration, and data sharing in a smart city environment is challenging. Hence, in this paper, IoT-based Improved Building Information modeling (IoT-IBIM) has been proposed to overcome the challenges in building information modeling in modern project management for sustainable smart city applications. This paper discusses the efforts to create and integrate built-in environment data with IoT sensors for effective communication. The Internet of Things provides efficient resource control, increased efficiency, and improved human quality of life. As a result, the Internet of Things is a critical enabler of smart societies, including smart homes, smart cities, and smart factories. Building Information Modeling is an advanced asset allocation framework that generates high-quality output, reduces resource use, reduces environmental effects of development, and secures resources and availability for future generations. The experimental results show that the proposed IoT-IBIM method enhances the performance ratio and improves data integration and data sharing in a smart city environment.


2012 ◽  
Vol 20 (1) ◽  
Author(s):  
T. Drozd ◽  
M. Zygmunt ◽  
P. Knysak ◽  
J. Wojtanowski

AbstractPulsed lasers are used mainly in lidar systems as sources of short and highly energetic light pulses. In data transmission systems continuous wave lasers are typically applied, however it is also possible to use pulsed lasers in such systems. Such approach seems to be especially reasonable for devices where a pulsed laser is applied anyway and executes another function (rangefinding). The article discusses a data transmission concept based on a pulsed laser technology. Advantages and limits of such a transmission method are described. Influence of individual transmission elements on the effective data transmission speed is analysed.


Sign in / Sign up

Export Citation Format

Share Document