scholarly journals ROUTER: Fog enabled cloud based intelligent resource management approach for smart home IoT devices

2019 ◽  
Vol 154 ◽  
pp. 125-138 ◽  
Author(s):  
Sukhpal Singh Gill ◽  
Peter Garraghan ◽  
Rajkumar Buyya
2020 ◽  
Vol 3 (1) ◽  
pp. 41-63 ◽  
Author(s):  
Basetty Mallikarjuna

In this article, the proposed feedback-based resource management approach provides data processing, huge computation, large storage, and networking services between Internet of Things (IoT)-based Cloud data centers and the end-users. The real-time applications of IoT, such as smart city, smart home, health care management systems, traffic management systems, and transportation management systems, require less response time and latency to process the huge amount of data. The proposed feedback-based resource management plan provides a novel resource management technique, consisting of an integrated architecture and maintains the service-level agreement (SLA). It can optimize energy consumption, response time, network bandwidth, security, and reduce latency. The experimental results are tested with the IFogSim tool kit and have proved that the proposed approach is effective and suitable for smart communication in IoT-based cloud.


2022 ◽  
pp. 803-824
Author(s):  
Basetty Mallikarjuna

In this article, the proposed feedback-based resource management approach provides data processing, huge computation, large storage, and networking services between Internet of Things (IoT)-based Cloud data centers and the end-users. The real-time applications of IoT, such as smart city, smart home, health care management systems, traffic management systems, and transportation management systems, require less response time and latency to process the huge amount of data. The proposed feedback-based resource management plan provides a novel resource management technique, consisting of an integrated architecture and maintains the service-level agreement (SLA). It can optimize energy consumption, response time, network bandwidth, security, and reduce latency. The experimental results are tested with the IFogSim tool kit and have proved that the proposed approach is effective and suitable for smart communication in IoT-based cloud.


2021 ◽  
Vol 20 (3) ◽  
pp. 1-25
Author(s):  
Elham Shamsa ◽  
Alma Pröbstl ◽  
Nima TaheriNejad ◽  
Anil Kanduri ◽  
Samarjit Chakraborty ◽  
...  

Smartphone users require high Battery Cycle Life (BCL) and high Quality of Experience (QoE) during their usage. These two objectives can be conflicting based on the user preference at run-time. Finding the best trade-off between QoE and BCL requires an intelligent resource management approach that considers and learns user preference at run-time. Current approaches focus on one of these two objectives and neglect the other, limiting their efficiency in meeting users’ needs. In this article, we present UBAR, User- and Battery-aware Resource management, which considers dynamic workload, user preference, and user plug-in/out pattern at run-time to provide a suitable trade-off between BCL and QoE. UBAR personalizes this trade-off by learning the user’s habits and using that to satisfy QoE, while considering battery temperature and State of Charge (SOC) pattern to maximize BCL. The evaluation results show that UBAR achieves 10% to 40% improvement compared to the existing state-of-the-art approaches.


IoT ◽  
2021 ◽  
Vol 2 (1) ◽  
pp. 140-162
Author(s):  
Hung Nguyen-An ◽  
Thomas Silverston ◽  
Taku Yamazaki ◽  
Takumi Miyoshi

We now use the Internet of things (IoT) in our everyday lives. The novel IoT devices collect cyber–physical data and provide information on the environment. Hence, IoT traffic will count for a major part of Internet traffic; however, its impact on the network is still widely unknown. IoT devices are prone to cyberattacks because of constrained resources or misconfigurations. It is essential to characterize IoT traffic and identify each device to monitor the IoT network and discriminate among legitimate and anomalous IoT traffic. In this study, we deployed a smart-home testbed comprising several IoT devices to study IoT traffic. We performed extensive measurement experiments using a novel IoT traffic generator tool called IoTTGen. This tool can generate traffic from multiple devices, emulating large-scale scenarios with different devices under different network conditions. We analyzed the IoT traffic properties by computing the entropy value of traffic parameters and visually observing the traffic on behavior shape graphs. We propose a new method for identifying traffic entropy-based devices, computing the entropy values of traffic features. The method relies on machine learning to classify the traffic. The proposed method succeeded in identifying devices with a performance accuracy up to 94% and is robust with unpredictable network behavior with traffic anomalies spreading in the network.


Sensors ◽  
2021 ◽  
Vol 21 (11) ◽  
pp. 3587
Author(s):  
Ezequiel Simeoni ◽  
Eugenio Gaeta ◽  
Rebeca I. García-Betances ◽  
Dave Raggett ◽  
Alejandro M. Medrano-Gil ◽  
...  

Internet of Things (IoT) technologies are already playing an important role in our daily activities as we use them and rely on them to increase our abilities, connectivity, productivity and quality of life. However, there are still obstacles to achieving a unique interface able to transfer full control to users given the diversity of protocols, properties and specifications in the varied IoT ecosystem. Particularly for the case of home automation systems, there is a high degree of fragmentation that limits interoperability, increasing the complexity and costs of developments and holding back their real potential of positively impacting users. In this article, we propose implementing W3C’s Web of Things Standard supported by home automation ontologies, such as SAREF and UniversAAL, to deploy the Living Lab Gateway that allows users to consume all IoT devices from a smart home, including those physically wired and using KNX® technology. This work, developed under the framework of the EC funded Plan4Act project, includes relevant features such as security, authentication and authorization provision, dynamic configuration and injection of devices, and devices abstraction and mapping into ontologies. Its deployment is explained in two scenarios to show the achieved technology’s degree of integration, the code simplicity for developers and the system’s scalability: one consisted of external hardware interfacing with the smart home, and the other of the injection of a new sensing device. A test was executed providing metrics that indicate that the Living Lab Gateway is competitive in terms of response performance.


2021 ◽  
pp. 5-16
Author(s):  
Parth Rustagi ◽  
◽  
◽  
◽  
◽  
...  

As useful as it gets to connect devices to the internet to make life easier and more comfortable, it also opens the gates to various cyber threats. The connection of Smart Home devices to the internet makes them vulnerable to malicious hackers that infiltrate the system. Hackers can penetrate these systems and have full control over devices. This can lead to denial of service, data leakage, invasion of privacy, etc. Thus security is a major aspect of Smart home devices. However, many companies manufacturing these Smart Home devices have little to no security protocols in their devices. In the process of making the IoT devices cheaper, various cost-cutting is done on the security protocols in IoT devices. In some way, many manufactures of the devices don’t even consider this as a factor to build upon. This leaves the devices vulnerable to attacks. Various authorities have worked upon to standardize the security aspects for the IoT and listed out guidelines for manufactures to follow, but many fail to abide by them. This paper introduces and talks about the various threats, various Security threats to Smart Home devices. It takes a deep dive into the solutions for the discussed threats. It also discusses their prevention. Lastly, it discusses various preventive measures and good practices to be incorporated to protect devices from any future attacks.


2021 ◽  
Vol 18 (4) ◽  
pp. 1275-1281
Author(s):  
R. Sudha ◽  
G. Indirani ◽  
S. Selvamuthukumaran

Resource management is a significant task of scheduling and allocating resources to applications to meet the required Quality of Service (QoS) limitations by the minimization of overhead with an effective resource utilization. This paper presents a Fog-enabled Cloud computing resource management model for smart homes by the Improved Grey Wolf Optimization Strategy. Besides, Kernel Support Vector Machine (KSVM) model is applied for series forecasting of time and also of processing load of a distributed server and determine the proper resources which should be allocated for the optimization of the service response time. The presented IGWO-KSVM model has been simulated under several aspects and the outcome exhibited the outstanding performance of the presented model.


Author(s):  
Blasius Suprapta

Abstract: Based on geological studies, the Malang Highlands, East Java, Indonesia is a former ancient lake that dried up and turned into a wide and fertile plateau. Such natural conditions allow the growth and development of Hindhu-Buddhist civilization in 10 - 14  AD, namely the socio-cultural life of a well-ordered community. This includes the structure of natural resource management by the state and society. Around 19 old Javanese Inscription certificates were issued by the king at that time. Some of these inscriptions contain the standard rules of the kingdom in relation to the management of natural resources, but so far there has not been an in-depth study of the rules of natural resource management in this region. In connection with this problem, the need to conduct a study of natural resource management based on Old Javanese Inscription through an environmental approach: Environmental Archeology. The study was conducted by literature study, toponymy analysis, geographical spatial analysis on topographical maps, and interpretation of natural resource management, through an environmental management approach. The results showed that there were rules for felling trees in primary forest areas, state forest management for the benefit of maintaining sacred buildings and there were rules for the sale and purchase of endemic plants, namely spices. Abstrak: Berdasarkan studi geologi, Dataran Tinggi Malang, Jawa Timur, Indonesia merupakan bekas danau purba yang mengering dan berubah menjadi dataran tinggi yang luas dan subur. Kondisi alam yang demikian memungkinkan tumbuh dan berkembangnya peradaban Hindhu-Budha pada 10 - 14 Masehi, yaitu kehidupan sosial budaya masyarakat yang tertata rapi. Ini termasuk struktur pengelolaan sumber daya alam oleh negara dan masyarakat. Sekitar 19 akte Prasasti Jawa kuno dikeluarkan oleh raja saat itu. Beberapa prasasti tersebut memuat aturan baku kerajaan dalam kaitannya dengan pengelolaan sumber daya alam, namun sejauh ini belum ada kajian yang mendalam tentang aturan pengelolaan sumber daya alam di wilayah ini. Sehubungan dengan masalah tersebut, perlu dilakukan kajian pengelolaan sumber daya alam berbasis Prasasti Jawa Kuno melalui pendekatan lingkungan: Arkeologi Lingkungan. Penelitian dilakukan dengan studi literatur, analisis toponimi, analisis spasial geografis pada peta topografi, dan interpretasi pengelolaan sumber daya alam, melalui pendekatan pengelolaan lingkungan. Hasil penelitian menunjukkan adanya aturan penebangan pohon di kawasan hutan primer, pengelolaan hutan negara untuk kepentingan pemeliharaan bangunan suci dan terdapat aturan jual beli tanaman endemik yaitu rempah-rempah.


2017 ◽  
Vol 3 (2) ◽  
pp. 175
Author(s):  
Ratna Indrawasih

Secara teoritis, praktek pengelolaan sumberdaya laut secara co-management lahir sebagai kritik terhadap pengelolaan yang bersifat sentralistik, seperti yang selama ini dipraktekkan di Indonesia dan community-based management. Kedua praktek pengelolaan sumberdaya laut ini memiliki kelemahan, yang diantaranya disebabkan oleh ketiadaan sinergi antara pemerintah dengan masyarakat (user group). Praktek co-management sebagai alternatif untuk mendorong terjadinya sinergi antar semua stakeholder terkait dalam pengelolaan sumberdaya laut. Penelitian ini mencoba mempelajari penerapan Co-fish di Kabupaten Lombok Timur- Nusa Tenggara Barat, yaitu pengelolaan sumberdaya laut yang dilakukan dengan pendekatan co-management dengan melibatkan stakeholder terkait. Bagaimana mekanisme dan dampaknya terhadap masyarakat binaannya serta bagaimana kekuatan dan kelemahannya yang didasarkan pada prinsip pendekatan co-management. Penelitian ini dilakukan melalui pendekatan kualitatif. Tittle: Co-management of Marine Resource : Lesson Learnt from the Management Model of Co-Fish in Lombok Timur District, Nusa Tenggara Barat Province.Theoritically, the practice of marine resource management was created as a criticied of centralistic management wich being, that was practiced in Indonesia for a long time , and community-based management. Both of these practices of marine resource management have weaknesses, caused by the inexistance of cooperation between government and society (user group). actice of co-management is an alternative option to push a cooperation among all of related stakeholder in marine resourcemanagement. The research to study the implementation of Co-Fish in Lombok Timur District, Province of Nusa Tenggara Barat. Marine resources management was carried out by co-management approach involving related srakeholders. The mechanism and impact of the implementation of Co-fish to the society, and how the strengths and weaknesses of Co-fish based on principal of co-management approach were analsed with qualitative approach.


Sign in / Sign up

Export Citation Format

Share Document