A Survey on Network Methodologies for Real-Time Analytics of Massive IoT Data and Open Research Issues

2017 ◽  
Vol 19 (3) ◽  
pp. 1457-1477 ◽  
Author(s):  
Shikhar Verma ◽  
Yuichi Kawamoto ◽  
Zubair Md. Fadlullah ◽  
Hiroki Nishiyama ◽  
Nei Kato
2016 ◽  
Vol 2016 ◽  
pp. 1-27 ◽  
Author(s):  
Vikas Bhandary ◽  
Amita Malik ◽  
Sanjay Kumar

With the advancement of wireless sensor networks (WSNs) and technology, applicability of WSNs as a system is touching new heights. The development of multimedia nodes has led to the creation of another intelligent distributed system, which can transfer real-time multimedia traffic, ubiquitously. Wireless multimedia sensor networks (WMSNs) are applicable in a wide range of areas including area monitoring and video surveillance. But due to unreliable error-prone communication medium and application specific quality of service (QoS) requirements, routing of real-time multimedia traffic in WMSNs poses a serious problem. The paper discusses various existing routing strategies in WMSNs, with their properties and limitations which lead to open research issues. Further, detailed classification and analytical comparison of discussed protocols are also presented.


2014 ◽  
Vol 15 (9) ◽  
pp. 776-793 ◽  
Author(s):  
Han Qi ◽  
Muhammad Shiraz ◽  
Jie-yao Liu ◽  
Abdullah Gani ◽  
Zulkanain Abdul Rahman ◽  
...  

Author(s):  
Ramgopal Kashyap

A large vault of terabytes of information created every day from present-day data frameworks and digital innovations, for example, the internet of things and distributed computing. Investigation of this enormous information requires a ton of endeavors at different dimensions to separate learning for central leadership. An examination is an ebb-and-flow territory of innovative work. The fundamental goal of this paper is to investigate the potential effect of enormous information challenges, open research issues, and different instruments related to it. Subsequently, this article gives a stage to study big data at various stages. It opens another skyline for analysts to build up the arrangement in light of the difficulties, and open research issues. The article comprehended that each large information stage has its core interest. Some of this is intended for bunch handling while some are great at constant scientific. Each large information stage likewise has explicit usefulness. Unique procedures were utilized for the investigation.


Author(s):  
Wenbing Zhao

In this article, we point out the threats to online gaming applications and present two strategies that can be used to build secure and dependable online gaming applications. These strategies not only seek the solution for gathering entropy to seed the PRNG used in such applications, but also intend to eliminate malicious intrusions to protect the seed and to maintain replica consistency. By applying these techniques, the online gaming applications can ensure its service integrity (both the service providers and the innocent players are protected) and guarantee high availability despite the presence of Byzantine faults. Finally, we outline some open research issues in this field.


2022 ◽  
pp. 1249-1274
Author(s):  
Ramgopal Kashyap

A large vault of terabytes of information created every day from present-day data frameworks and digital innovations, for example, the internet of things and distributed computing. Investigation of this enormous information requires a ton of endeavors at different dimensions to separate learning for central leadership. An examination is an ebb-and-flow territory of innovative work. The fundamental goal of this paper is to investigate the potential effect of enormous information challenges, open research issues, and different instruments related to it. Subsequently, this article gives a stage to study big data at various stages. It opens another skyline for analysts to build up the arrangement in light of the difficulties, and open research issues. The article comprehended that each large information stage has its core interest. Some of this is intended for bunch handling while some are great at constant scientific. Each large information stage likewise has explicit usefulness. Unique procedures were utilized for the investigation.


Author(s):  
Rinki Sharma

Over the years, the industrial and manufacturing applications have become highly connected and automated. The incorporation of interconnected smart sensors, actuators, instruments, and other devices helps in establishing higher reliability and efficiency in the industrial and manufacturing process. This has given rise to the industrial internet of things (IIoT). Since IIoT components are scattered all over the network, real-time authenticity of the IIoT activities becomes essential. Blockchain technology is being considered by the researchers as the decentralized architecture to securely process the IIoT transactions. However, there are challenges involved in effective implementation of blockchain in IIoT. This chapter presents the importance of blockchain in IIoT paradigm, its role in different IIoT applications, challenges involved, possible solutions to overcome the challenges and open research issues.


Sign in / Sign up

Export Citation Format

Share Document