scholarly journals Grid-PPPS: A Skyline Method for Efficiently Handling Top-kQueries in Internet of Things

2014 ◽  
Vol 2014 ◽  
pp. 1-10 ◽  
Author(s):  
Sun-Young Ihm ◽  
Aziz Nasridinov ◽  
Young-Ho Park

A rapid development in wireless communication and radio frequency technology has enabled the Internet of Things (IoT) to enter every aspect of our life. However, as more and more sensors get connected to the Internet, they generate huge amounts of data. Thus, widespread deployment of IoT requires development of solutions for analyzing the potentially huge amounts of data they generate. A top-kquery processing can be applied to facilitate this task. The top-kqueries retrievektuples with the lowest or the highest scores among all of the tuples in the database. There are many methods to answer top-kqueries, where skyline methods are efficient when considering all attribute values of tuples. The representative skyline methods are soft-filter-skyline (SFS) algorithm, angle-based space partitioning (ABSP), and plane-project-parallel-skyline (PPPS). Among them, PPPS improves ABSP by partitioning data space into a number of spaces using hyperplane projection. However, PPPS has a high index building time in high-dimensional databases. In this paper, we propose a new skyline method (called Grid-PPPS) for efficiently handling top-kqueries in IoT applications. The proposed method first performs grid-based partitioning on data space and then partitions it once again using hyperplane projection. Experimental results show that our method improves the index building time compared to the existing state-of-the-art methods.

2012 ◽  
Vol 452-453 ◽  
pp. 932-936
Author(s):  
Xiang Dong Hu ◽  
Peng Qin Yu

With the rapid development of ubiquitous network and its applications, the key technologies of the Internet of things are actively researched all over the world. The Internet of things has tremendous attraction for adversaries, and it is easily attacked due to poor resource and non-perfect distribution of sensor nodes, then false data maybe be injected into network. Security is one of the most important demands for applications in the Internet of things, an algorithm of malicious nodes detection is proposed to protect the network from destruction based on weighted confidence filter, namely, the cluster heads take charge of collecting messages from nodes and computing their average of confidence in cluster-based network, then they aggregate data from nodes with higher confidence than average and ignore the others, they update confidence of each node by comparing the aggregation value and the received data, and regard it as the weight of exactness of message from node. A sensor node is judged to be a malicious one if its weight is lower than the set threshold. The simulation results show that the algorithm can detect malicious nodes with high detection ratio, low false alarm ratio and outstanding scalability.


2021 ◽  
Vol 12 (36) ◽  
pp. 11936-11954
Author(s):  
Kai-Li Wang ◽  
Yu-Hang Zhou ◽  
Yan-Hui Lou ◽  
Zhao-Kui Wang

With the rapid development of the Internet of Things (IoTs), photovoltaics (PVs) has a vast market supply gap of billion dollars.


2021 ◽  
Vol 2021 ◽  
pp. 1-12
Author(s):  
Jie Du

As the economy grows rapidly and IoT technology advances rapidly, the logistics industry as a service industry is growing rapidly around the world. The logistics industry, meanwhile, is the one that can best play the role of IoT. The rapid development of the logistics industry has brought great competition challenges to the logistics industry. To solve the competitive problems of the logistics industry cluster, this article introduces the research on the upgrade path and strategy of the logistics industry cluster based on the Internet of Things and uses the analytic hierarchy process, investigation method, and expert evaluation method to build the IoT technology information model and logistics cost. According to the established optimization model, the following are proposed: analyzing the problems existing in the logistics industry cluster, giving an upgrade path from the four aspects of manufacturing, technology, structure, and service, and giving specific strategic suggestions from the aspects of talents and enterprises. The accuracy rate of current analysis is as high as 90%, and the implementation rate of upgrade paths and strategy recommendations is as high as 95%.


2021 ◽  
Vol 6 (3) ◽  
pp. 33-39
Author(s):  
Oleg O. Viushchenko ◽  
◽  
Maria A. Maslova ◽  

The rapid development of the Internet of Things (IoT) and its capabilities in terms of services have made it one of the fastest-growing technologies that have a huge impact on both social life and the business environment of a person. The widespread adoption of connected devices in the IoT has created a huge demand for reliable security in response to the growing demand of billions of connected devices and services around the world. But at the same time, the number of threats continues to grow every day, and attacks are increasing both in number and complexity. The number of attackers is also growing, and the tools they use are constantly being improved and becoming more effective. Therefore, it is necessary to constantly protect against threats and vulnerabilities for IoT. In this article, we will analyze the development of IoT, consider existing threats, attacks on IoT, as well as methods of protecting devices from threats and vulnerabilities for IoT.


Electronics ◽  
2021 ◽  
Vol 10 (24) ◽  
pp. 3155
Author(s):  
Erfeng Li ◽  
Xue Jun Li ◽  
Boon-Chong Seet

With the rapid development of wireless communication technology and the Internet of Things (IoT), wireless body area networks (WBAN) have been thriving. This paper presents a triband patch antenna with multiple slots for conformal and wearable applications. The proposed antenna operates at 5.8, 6.2, and 8.4 GHz. The antenna was designed with a flexible polyethylene terephthalate (PET) substrate, and the corresponding conformal tests and on-body performance were conducted via simulation. The antenna demonstrated promising gain and acceptable fluctuations when applied on curvature surfaces. The specific absorption rate (SAR) for on-body simulation also suggests that this antenna is suitable for wearable applications.


Sensors ◽  
2019 ◽  
Vol 19 (14) ◽  
pp. 3208 ◽  
Author(s):  
Armin Babaei ◽  
Gregor Schiele

Attacks on Internet of Things (IoT) devices are on the rise. Physical Unclonable Functions (PUFs) are proposed as a robust and lightweight solution to secure IoT devices. The main advantage of a PUF compared to the current classical cryptographic solutions is its compatibility with IoT devices with limited computational resources. In this paper, we investigate the maturity of this technology and the challenges toward PUF utilization in IoT that still need to be addressed.


Sign in / Sign up

Export Citation Format

Share Document