The Internet of People: A human and data-centric paradigm for the Next Generation Internet

2018 ◽  
Vol 131 ◽  
pp. 51-65 ◽  
Author(s):  
Marco Conti ◽  
Andrea Passarella
2019 ◽  
Vol 52 (5-6) ◽  
pp. 338-353 ◽  
Author(s):  
Murat Aydos ◽  
Yılmaz Vural ◽  
Adem Tekerek

Internet of Things is the next-generation Internet network created by intelligent objects with software and sensors, employed in a wide range of fields such as automotive, construction, health, textile, education and transportation. With the advent of Industry 4.0, Internet of Things has been started to be used and it has led to the emergence of innovative business models. The processing and production capabilities of Internet of Things objects in hidden and critical data provide great advantages for the next generation of Internet. However, the integrated features of Internet of Things objects cause vulnerabilities in terms of security, making them the target of cyber threats. In this study, a security model which offers an integrated risk-based Internet of Things security approach for the Internet of Things vulnerabilities while providing detailed information about Internet of Things and the types of attacks targeting Internet of Things is proposed. In addition, in this study, the vulnerabilities of Internet of Things were explained by classifying attack types threatening the physical layer, network layer, data processing layer and application layer. Moreover, the risk-based security model has been proposed by examining the vulnerabilities and threats of smart objects that generate the Internet of Things. The proposed Internet of Things model is a holistic security model that separately evaluates the Internet of Things layers against vulnerabilities and threats based on the risk-level approach.


Author(s):  
Ying Liu ◽  
Jianping Wu ◽  
Qian Wu ◽  
Ke Xu

The Internet has become a major part of the global communications infrastructure supporting modern-day socio-economic development, social progress and technological innovation. Invented 30 years ago, today the Internet is facing severe challenges. Many countries have funded research projects on the new-generation Internet, such as GENI, FIND, FIRE and CNGI, in an effort to solve these challenges. In addition, over the past few years, the networking research community has engaged in an ongoing conversation about how to move the Internet forward, and there are now two different approaches towards Internet research. The first approach is based on using the existing Internet architecture to solve the major technical challenges—this is called ‘evolutionary’ research. The other, which is called the ‘clean slate’, involves the design of an entirely new Internet architecture. In the first part of this paper, the basic features of the next generation Internet and its principal contradictions are analysed. Then a survey of recent progress in the study of the next generation Internet in China is discussed. Finally, the focus and direction for the next step in research are presented as based on fundamental research into the international next generation Internet architecture, and the many new innovative demands placed on Internet architecture in recent years.


Sensors ◽  
2021 ◽  
Vol 21 (4) ◽  
pp. 1174
Author(s):  
Yousaf Bin Zikria ◽  
Rashid Ali ◽  
Muhammad Khalil Afzal ◽  
Sung Won Kim

It is predicted that by 2025, all devices will be connected to the Internet, subsequently causing the number of devices connected with the Internet to rise [...]


Author(s):  
Wen-Lung Shiau ◽  
Chen-Yao Chung ◽  
Ping-Yu Hsu

The growing popularity of the Internet has resulted in attracting many enterprises to do business transactions over the Internet. The current Internet protocol version 4 (IPv4) has been used for over 20 years. Even though IPv4 applications have been quite successful, it faces a problem of shortage in IP addresses, ineffective security mechanisms, and a lack of service quality management, etc. Scientists and engineers have devoted considerable effort to the development of next generation Internet protocol version 6 (IPv6), which is the core component of Next Generation Internet (NGI) to meet the future requirements of the Internet. Even though NGI is technically superior to the traditional Internet and is being established worldwide, few people have transmitted data through it. According to the Innovation Development Process in the Diffusion of Innovation theory, IPv6 is currently in a stage of technological diffusion. The research studies whether educating potential customers with more IPv6 knowledge created in the innovation process can increase their preference for the technology. With surveys collected from 596 undergraduate students, the results show that knowledge of the commercial applications of IPv6 in mobile communications and information appliances significantly contributes to a preference for the IPv6 technology.


2021 ◽  
Vol 51 (1) ◽  
pp. 32-38
Author(s):  
Nikolaos Laoutaris ◽  
Costas Iordanou

What if instead of having to implement controversial user tracking techniques, Internet advertising & marketing companies asked explicitly to be granted access to user data by name and category, such as Alice→Mobility→05-11-2020? The technology for implementing this already exists, and is none other than the Information Centric Networks (ICN), developed for over a decade in the framework of Next Generation Internet (NGI) initiatives. Beyond named access to personal data, ICN's in-network storage capability can be used as a substrate for retrieving aggregated, anonymized data, or even for executing complex analytics within the network, with no personal data leaking outside. In this opinion article we discuss how ICNs combined with trusted execution environments and digital watermarking, can be combined to build a personal data overlay inter-network in which users will be able to control who gets access to their personal data, know where each copy of said data is, negotiate payments in exchange for data, and even claim ownership, and establish accountability for data leakages due to malfunctions or malice. Of course, coming up with concrete designs about how to achieve all the above will require a huge effort from a dedicated community willing to change how personal data are handled on the Internet. Our hope is that this opinion article can plant some initial seeds towards this direction.


Network ◽  
2021 ◽  
Vol 1 (1) ◽  
pp. 28-49
Author(s):  
Ehsan Ahvar ◽  
Shohreh Ahvar ◽  
Syed Mohsan Raza ◽  
Jose Manuel Sanchez Vilchez ◽  
Gyu Myoung Lee

In recent years, the number of objects connected to the internet have significantly increased. Increasing the number of connected devices to the internet is transforming today’s Internet of Things (IoT) into massive IoT of the future. It is predicted that, in a few years, a high communication and computation capacity will be required to meet the demands of massive IoT devices and applications requiring data sharing and processing. 5G and beyond mobile networks are expected to fulfill a part of these requirements by providing a data rate of up to terabits per second. It will be a key enabler to support massive IoT and emerging mission critical applications with strict delay constraints. On the other hand, the next generation of software-defined networking (SDN) with emerging cloudrelated technologies (e.g., fog and edge computing) can play an important role in supporting and implementing the above-mentioned applications. This paper sets out the potential opportunities and important challenges that must be addressed in considering options for using SDN in hybrid cloud-fog systems to support 5G and beyond-enabled applications.


Sign in / Sign up

Export Citation Format

Share Document