Robust Networking: Dynamic Topology Evolution Learning for Internet of Things

2021 ◽  
Vol 17 (3) ◽  
pp. 1-23
Author(s):  
Ning Chen ◽  
Tie Qiu ◽  
Mahmoud Daneshmand ◽  
Dapeng Oliver Wu

The Internet of Things (IoT) has been extensively deployed in smart cities. However, with the expanding scale of networking, the failure of some nodes in the network severely affects the communication capacity of IoT applications. Therefore, researchers pay attention to improving communication capacity caused by network failures for applications that require high quality of services (QoS). Furthermore, the robustness of network topology is an important metric to measure the network communication capacity and the ability to resist the cyber-attacks induced by some failed nodes. While some algorithms have been proposed to enhance the robustness of IoT topologies, they are characterized by large computation overhead, and lacking a lightweight topology optimization model. To address this problem, we first propose a novel robustness optimization using evolution learning (ROEL) with a neural network. ROEL dynamically optimizes the IoT topology and intelligently prospects the robust degree in the process of evolutionary optimization. The experimental results demonstrate that ROEL can represent the evolutionary process of IoT topologies, and the prediction accuracy of network robustness is satisfactory with a small error ratio. Our algorithm has a better tolerance capacity in terms of resistance to random attacks and malicious attacks compared with other algorithms.

Author(s):  
Wissam Abbass ◽  
Amine Baina ◽  
Mostafa Bellafkih

The rapid growth of the world's population is placing a huge strain on the existing infrastructures. As a quest for accommodating this growth, interest is turned to the internet of things (IoT). In fact, the IoT is significantly improving today's quality of life by innovating the provided services and enhancing communication and interaction. Furthermore, it has also empowered real-time decision making by introducing dynamic services for innovative traffic handling, energy-efficient infrastructure saving, and public safety ensuring. However, IoT applications for smart cities is still a major issue as it lacks assuring privacy and security within provided services. In this chapter, the authors pinpoint IoT's security risk assessment challenges and examine its critical influence on smart cities. Additionally, they highlight the key aspects characterizing a smart city which also represent the critical assets requiring security risk assessment. Moreover, they discuss the resulting issues and their related countermeasures.


2020 ◽  
Vol 14 (2) ◽  
pp. 185-195
Author(s):  
Ricardo Alirio González Bustamante ◽  
Roberto Ferro Escobar ◽  
Harold Vacca González

The use of the Internet has Reached a point in the world in Which it has Become essential in everyday life, the need to Have information at hand in the shortest possible time has generated a technological revolution That incurs the constant connection to this tool, from our Personal life to the same objects That we use in daily life, creating a need to check what surrounds us to Improve our quality of life, reason for the birth of the Internet of Things (IoT, for acronym in English), as well as the convergence of our environment through the creation with Technology of smart cities (Smart City in English). In view of the above, this article addresses concepts about the future of smart cities in collaboration with the Internet of things, the advantages and Disadvantages of these, their comparison, reception, adaptability.


2020 ◽  
Vol 12 (10) ◽  
pp. 162
Author(s):  
William Villegas-Ch ◽  
Xavier Palacios-Pacheco ◽  
Milton Román-Cañizares

Currently, there are several emerging technologies that seek to improve quality of life. To achieve this, it is important to establish the various technologies’ fields of action and to determine which technology meets the conditions established by the environment in which it is designed to operate in order to satisfy the needs of society. One type of environment is the university campus. This particular environment is conducive to the development and testing of technological innovations that might later be replicated in larger environments such as smart cities. The technology that has experienced the greatest development and introduction of applications is the Internet of Things. The wide variety of available devices and the wide reach of the Internet have become ideal parameters for the application of the Internet of Things in areas that previously required the work of people. The Internet of Things is seen as an assistant to, or a substitute for, processes that are generally routine and which require the effort of one or more people. This work focuses specifically on processes to improve administrative management in a university through the use of the Internet of Things.


Author(s):  
Ganesh Khekare ◽  
Pushpneel Verma ◽  
Urvashi Dhanre ◽  
Seema Raut ◽  
Ganesh Yenurkar

The internet of things (IoT) is transpiring technology. In the last decade, demand of IoT has been increased due to various things like the use of smart devices; increased demand for voice-based services; the concept of smart cities has been evolved; more requirements of processed data in fields of artificial intelligence and machine learning; fog computing, deep learning, etc. IoT is expected to reach the milestone of 30 billion IoT units at the end of the year 2020. Internet of things is the network of statutory things like houses, private companies, automobiles, and various objects integrated with sensors, actuators, software, electronic equipment, and internet availability that provides the facility to devices to interchange their data. The main contribution of this article is to provide state of art about the characteristics, functionalities, and challenges of the internet of things and the journey of IoT right from start to how it will make an impact on people's quality of life throughout the world in the near future.


2020 ◽  
Vol 14 (2) ◽  
pp. 264-270
Author(s):  
Andrea Liliana Fagua Fagua ◽  
José Custodio Najar Pacheco

In recent years, the Internet has evolved till become the Internet of Things (IoT for its acronym). This is one of the most important and significant inventions of all humanity, generating a direct impact on the way of how people live, think and act. It is one of the most used terms by anyone who talks about intelligent connectivity. Internet of things changes everything, is the answer to connect to the network an incredible number of people and link everyday objects, which are equipped with sensors, actuators and communication technologies and they are used to exchange information from the physical world through the Internet, offering data in real time and monitored through the network. Thanks to IoT, more and more companies are integrating small sensors to real-world objects, which provide information about almost everything that can be measured, so the amount of information circulating through networks grows exponentially. Smart cities are a good example of the benefits that IoT brings, by improving the quality of life of people with the services that are offered in an efficient and sustainable way. The installation of IoT brings great challenges focused on information security in organizations, but also opportunities for development in all areas of daily life and excellent ideas for innovation.


Author(s):  
Edward T. Chen

The Internet of Things (IoT) has the potential to increase quality of life, heighten performance of systems and processes, and save valuable time for businesses and people. Common objects and devices are being linked with Internet connectivity and have capabilities for data analytics that affect day-to-day experiences of both individuals and businesses. The notions of Smart Health, Smart Cities, and Smart Living come into play as the Internet of Things plays a role in today's world. This chapter presents IoT devices and application examples as well as descriptions of the benefits and limitations alongside an assessment of each respective technology's potential for success in the future. Security and privacy are important factors that need to be addressed within the different domains. This chapter addresses these potentials, issues, and challenges for managers to be prepared for the new wave brought forth by the IoT.


Smart Cities ◽  
2021 ◽  
Vol 4 (2) ◽  
pp. 894-918
Author(s):  
Luís Rosa ◽  
Fábio Silva ◽  
Cesar Analide

The evolution of Mobile Networks and Internet of Things (IoT) architectures allows one to rethink the way smart cities infrastructures are designed and managed, and solve a number of problems in terms of human mobility. The territories that adopt the sensoring era can take advantage of this disruptive technology to improve the quality of mobility of their citizens and the rationalization of their resources. However, with this rapid development of smart terminals and infrastructures, as well as the proliferation of diversified applications, even current networks may not be able to completely meet quickly rising human mobility demands. Thus, they are facing many challenges and to cope with these challenges, different standards and projects have been proposed so far. Accordingly, Artificial Intelligence (AI) has been utilized as a new paradigm for the design and optimization of mobile networks with a high level of intelligence. The objective of this work is to identify and discuss the challenges of mobile networks, alongside IoT and AI, to characterize smart human mobility and to discuss some workable solutions to these challenges. Finally, based on this discussion, we propose paths for future smart human mobility researches.


2021 ◽  
Vol 21 (3) ◽  
pp. 1-22
Author(s):  
Celestine Iwendi ◽  
Saif Ur Rehman ◽  
Abdul Rehman Javed ◽  
Suleman Khan ◽  
Gautam Srivastava

In this digital age, human dependency on technology in various fields has been increasing tremendously. Torrential amounts of different electronic products are being manufactured daily for everyday use. With this advancement in the world of Internet technology, cybersecurity of software and hardware systems are now prerequisites for major business’ operations. Every technology on the market has multiple vulnerabilities that are exploited by hackers and cyber-criminals daily to manipulate data sometimes for malicious purposes. In any system, the Intrusion Detection System (IDS) is a fundamental component for ensuring the security of devices from digital attacks. Recognition of new developing digital threats is getting harder for existing IDS. Furthermore, advanced frameworks are required for IDS to function both efficiently and effectively. The commonly observed cyber-attacks in the business domain include minor attacks used for stealing private data. This article presents a deep learning methodology for detecting cyber-attacks on the Internet of Things using a Long Short Term Networks classifier. Our extensive experimental testing show an Accuracy of 99.09%, F1-score of 99.46%, and Recall of 99.51%, respectively. A detailed metric representing our results in tabular form was used to compare how our model was better than other state-of-the-art models in detecting cyber-attacks with proficiency.


Sensors ◽  
2021 ◽  
Vol 21 (5) ◽  
pp. 1598
Author(s):  
Sigurd Frej Joel Jørgensen Ankergård ◽  
Edlira Dushku ◽  
Nicola Dragoni

The Internet of Things (IoT) ecosystem comprises billions of heterogeneous Internet-connected devices which are revolutionizing many domains, such as healthcare, transportation, smart cities, to mention only a few. Along with the unprecedented new opportunities, the IoT revolution is creating an enormous attack surface for potential sophisticated cyber attacks. In this context, Remote Attestation (RA) has gained wide interest as an important security technique to remotely detect adversarial presence and assure the legitimate state of an IoT device. While many RA approaches proposed in the literature make different assumptions regarding the architecture of IoT devices and adversary capabilities, most typical RA schemes rely on minimal Root of Trust by leveraging hardware that guarantees code and memory isolation. However, the presence of a specialized hardware is not always a realistic assumption, for instance, in the context of legacy IoT devices and resource-constrained IoT devices. In this paper, we survey and analyze existing software-based RA schemes (i.e., RA schemes not relying on specialized hardware components) through the lens of IoT. In particular, we provide a comprehensive overview of their design characteristics and security capabilities, analyzing their advantages and disadvantages. Finally, we discuss the opportunities that these RA schemes bring in attesting legacy and resource-constrained IoT devices, along with open research issues.


Sign in / Sign up

Export Citation Format

Share Document