scholarly journals Improving Topic-Based Data Exchanges among IoT Devices

2020 ◽  
Vol 2020 ◽  
pp. 1-14
Author(s):  
Fu Chen ◽  
Peng Liu ◽  
Jianming Zhu ◽  
Sheng Gao ◽  
Yanmei Zhang ◽  
...  

Data exchange is one of the huge challenges in Internet of Things (IoT) with billions of heterogeneous devices already connected and many more to come in the future. Improving data transfer efficiency, scalability, and survivability in the fragile network environment and constrained resources in IoT systems is always a fundamental issues. In this paper, we present a novel message routing algorithm that optimizes IoT data transfers in a resource constrained and fragile network environment in publish-subscribe model. The proposed algorithm can adapt the dynamical network topology of continuously changing IoT devices with the rerouting method. We also present a rerouting algorithm in Message Queuing Telemetry Transport (MQTT) to take over the topic-based session flows with a controller when a broker crashed down. Data can still be communicated by another broker with rerouting mechanism. Higher availability in IoT can be achieved with our proposed model. Through demonstrated efficiency of our algorithms about message routing and dynamically adapting the continually changing device and network topology, IoT systems can gain scalability and survivability. We have evaluated our algorithms with open source Eclipse Mosquitto. With the extensive experiments and simulations performed in Mosquitto, the results show that our algorithms perform optimally. The proposed algorithms can be widely used in IoT systems with publish-subscribe model. Furthermore, the algorithms can also be adopted in other protocols such as Constrained Application Protocol (CoAP).

Sensors ◽  
2018 ◽  
Vol 18 (9) ◽  
pp. 3071 ◽  
Author(s):  
Jun-Hong Park ◽  
Hyeong-Su Kim ◽  
Won-Tae Kim

Edge computing is proposed to solve the problem of centralized cloud computing caused by a large number of IoT (Internet of Things) devices. The IoT protocols need to be modified according to the edge computing paradigm, where the edge computing devices for analyzing IoT data are distributed to the edge networks. The MQTT (Message Queuing Telemetry Transport) protocol, as a data distribution protocol widely adopted in many international IoT standards, is suitable for cloud computing because it uses a centralized broker to effectively collect and transmit data. However, the standard MQTT may suffer from serious traffic congestion problem on the broker, causing long transfer delays if there are massive IoT devices connected to the broker. In addition, the big data exchange between the IoT devices and the broker decreases network capability of the edge networks. The authors in this paper propose a novel MQTT with a multicast mechanism to minimize data transfer delay and network usage for the massive IoT communications. The proposed MQTT reduces data transfer delays by establishing bidirectional SDN (Software Defined Networking) multicast trees between the publishers and the subscribers by means of bypassing the centralized broker. As a result, it can reduce transmission delay by 65% and network usage by 58% compared with the standard MQTT.


2021 ◽  
Vol 1 (48) ◽  
pp. 63-72
Author(s):  
Gavrilenko O ◽  
◽  
Shumeiko O ◽  
Nabokov E ◽  
◽  
...  

In this article is being reviewed different approaches to optimize data exchange in a network using cryptography - to make any date secure, compression - to make any data smaller and accelerated routing, which is based on meta information about target destination: how far they are, how loaded they are. The object of research is the process of data exchange in the network. The purpose of the study is to optimize the process of data exchange in the network in order to improve the security and speed of data transfer. Research methods - statistical analysis of data transmission efficiency indicators. When transmitting data, cryptographic algorithms are used to ensure integrity and security, these algorithms allow the exchange of data using public and private key technology. But now this may not be enough to complicate the process of decrypting the data, it is advisable to make the messages transmitted between nodes as similar as possible to each other, for example, the same length. This solution will minimize the possibility of revealing the cipher by analysis for the attacker, but at the same time significantly increases the volume of transmitted messages due to the additional «masking» amount of data. To compensate for this effect in high-load networks, it is proposed to use a smart routing algorithm, which allows you to choose the optimal route for messages, taking into account the load of routers and channels between them. KEY WORDS: REQUEST, DATA EXCHANGE, ENCODINGS, ROUTING, CRYPTOGRAPHY


2018 ◽  
Vol 25 (s2) ◽  
pp. 62-68
Author(s):  
Jianguang Zhao ◽  
Jingjing Fan

Abstract In view of the characteristics of low speed mobile ship network, strong network dynamics and large signal interference, this paper proposes a low-rate mobile sensor network routing algorithm. In mobile wireless sensor networks, network topology changes frequently is a new challenge for resource constrained sensor node. Constantly updated network topology, sensor nodes need to exchange data frequently in order to maintain fresh route, resulting in sensor nodes consume a lot of energy. To solve this problem, to reduce control overhead is considered to be an effctive strategy. In this paper, we present a vector network-based dynamic routes (VNDR) scheme aims to minimize the control cost of the sensor nodes. We propose data exchange based on binary-coded vector address to reduce the control cost, moreover, we present a set of communication rules that govern the routes search procedure thereby requiring little cost of packet analysis to determine the next hop of node. VNDR performance was compared with well known scheme such as SPIN and DD. Simulation results show that, our VNDR scheme reduced the network control overhead and improved network lifetime.


Smart Cities ◽  
2021 ◽  
Vol 4 (1) ◽  
pp. 253-270
Author(s):  
Mohammed Bin Hariz ◽  
Dhaou Said ◽  
Hussein T. Mouftah

This paper focuses on transportation models in smart cities. We propose a new dynamic mobility traffic (DMT) scheme which combines public buses and car ride-sharing. The main objective is to improve transportation by maximizing the riders’ satisfaction based on real-time data exchange between the regional manager, the public buses, the car ride-sharing and the riders. OpenStreetMap and OMNET++ were used to implement a realistic scenario for the proposed model in a city like Ottawa. The DMT scheme was compared to a multi-loading system used for a school bus. Simulations showed that rider satisfaction was enhanced when a suitable combination of transportation modes was used. Additionally, compared to the other scheme, this DMT scheme can reduce the stress level of car ride-sharing and public buses during the day to the minimal level.


Sensors ◽  
2020 ◽  
Vol 20 (22) ◽  
pp. 6546
Author(s):  
Kazi Masum Sadique ◽  
Rahim Rahmani ◽  
Paul Johannesson

The Internet of things (IoT) will accommodate several billions of devices to the Internet to enhance human society as well as to improve the quality of living. A huge number of sensors, actuators, gateways, servers, and related end-user applications will be connected to the Internet. All these entities require identities to communicate with each other. The communicating devices may have mobility and currently, the only main identity solution is IP based identity management which is not suitable for the authentication and authorization of the heterogeneous IoT devices. Sometimes devices and applications need to communicate in real-time to make decisions within very short times. Most of the recently proposed solutions for identity management are cloud-based. Those cloud-based identity management solutions are not feasible for heterogeneous IoT devices. In this paper, we have proposed an edge-fog based decentralized identity management and authentication solution for IoT devices (IoTD) and edge IoT gateways (EIoTG). We have also presented a secure communication protocol for communication between edge IoT devices and edge IoT gateways. The proposed security protocols are verified using Scyther formal verification tool, which is a popular tool for automated verification of security protocols. The proposed model is specified using the PROMELA language. SPIN model checker is used to confirm the specification of the proposed model. The results show different message flows without any error.


Author(s):  
Srinivasa P. Varanasi ◽  
Athamaram H. Soni

Abstract Data exchange between different CAD systems usually requires conversion between different representations of free-form curves and surfaces. Also, trimmed surfaces give rise to high degree boundary curves. Accurate conversion of these forms becomes necessary for reliable data transfer. Also important is the issue of shape control, specially in the aircraft industry. The objective of this paper is to investigate conversion methods and effect of shape control on the design and choice of such methods.


Author(s):  
Dao Xuan Uoc

Zigbee wireless network built on IEEE 802.15.4 standard is becoming one of the most popular wireless networks in modern IoT devices. One of the disadvantages of Zigbee networks is the short transmission distance between devices. This paper focuses on researching and comparing routing algorithms in Zigbee networks, thereby building the optimal routing algorithm in the existing system. The paper’s objective is to form the basis for making Zigbee tree and mesh networks, which improves the transmission distance for Zigbee networks better than the star network.


1993 ◽  
Vol 47 (8) ◽  
pp. 1093-1099 ◽  
Author(s):  
Antony N. Davies ◽  
Peter Lampen

Following the development and publication of the JCAMP-DX protocol 4.24 and its successful implementation in the field of infrared spectroscopy, data exchange without loss of information, between systems of different origin and internal format, has become a reality. The benefits of this system-independent data transfer standard have been recognized by workers in other areas who have expressed a wish for an equivalent, compatible standard in their own fields. This publication details a protocol for the exchange of Nuclear Magnetic Resonance (NMR) spectral data without any loss of information and in a format that is compatible with all storage media and computer systems. The protocol detailed below is designed for spectral data transfer, and its use for NMR imaging data transfer has not as yet been investigated.


2018 ◽  
Vol 7 (2.7) ◽  
pp. 203 ◽  
Author(s):  
Kalathiripi Rambabu ◽  
N Venkatram

The phenomenal and continuous growth of diversified IOT (Internet of Things) dependent networks has open for security and connectivity challenges. This is due to the nature of IOT devices, loosely coupled behavior of internetworking, and heterogenic structure of the networks.  These factors are highly vulnerable to traffic flow based DDOS (distributed-denial of services) attacks. The botnets such as “mirae” noticed in recent past exploits the IoT devises and tune them to flood the traffic flow such that the target network exhaust to response to benevolent requests. Hence the contribution of this manuscript proposed a novel learning-based model that learns from the traffic flow features defined to distinguish the DDOS attack prone traffic flows and benevolent traffic flows. The performance analysis was done empirically by using the synthesized traffic flows that are high in volume and source of attacks. The values obtained for statistical metrics are evincing the significance and robustness of the proposed model


Author(s):  
S. Arokiaraj ◽  
Dr. N. Viswanathan

With the advent of Internet of things(IoT),HA (HA) recognition has contributed the more application in health care in terms of diagnosis and Clinical process. These devices must be aware of human movements to provide better aid in the clinical applications as well as user’s daily activity.Also , In addition to machine and deep learning algorithms, HA recognition systems has significantly improved in terms of high accurate recognition. However, the most of the existing models designed needs improvisation in terms of accuracy and computational overhead. In this research paper, we proposed a BAT optimized Long Short term Memory (BAT-LSTM) for an effective recognition of human activities using real time IoT systems. The data are collected by implanting the Internet of things) devices invasively. Then, proposed BAT-LSTM is deployed to extract the temporal features which are then used for classification to HA. Nearly 10,0000 dataset were collected and used for evaluating the proposed model. For the validation of proposed framework, accuracy, precision, recall, specificity and F1-score parameters are chosen and comparison is done with the other state-of-art deep learning models. The finding shows the proposed model outperforms the other learning models and finds its suitability for the HA recognition.


Sign in / Sign up

Export Citation Format

Share Document