scholarly journals RT-RCT: an online tool for real-time retrieval of connected things

2021 ◽  
Vol 10 (5) ◽  
pp. 2804-2810
Author(s):  
Fatima Zahra Fagroud ◽  
El Habib Ben Lahmar ◽  
Hicham Toumi ◽  
Youssef Baddi ◽  
Sanaa El Filali

In recent years, internet of things (IoT) represents a giant and a promoter area in innovation and engineering fields. IoT devices are spread in various fields and offer advanced services which assist their users to monitor and control objects remotely. IoT has a set of special characteristics such as dynamic, variety of data and huge scale which introduces a great challenge in the field of retrieval technologies, more precisely real-time retrieval. This paper addresses the issue of real-time retrieval of connected things and tries to propose an innovative solution which allows the retrieval of these things and their descriptive data. The paper proposes an on-line tool for real-time retrieval of connected things and their descriptive data based on network port scanning technique. The performance of this tool proves to be powerful under normal conditions, however more tests must be implemented in the aim to improve the proposed solution. The tool resulted from this work appears to be promising and can be used as a reference by network administrators and IT security managers for the development of new security mechanisms and security reinforcement.

2018 ◽  
Vol 14 (02) ◽  
pp. 6
Author(s):  
Toni Tegar Sahidi ◽  
Achmad Basuki ◽  
Herman Tolle

<p class="western">Internet of things (IoT) is a complex system with few best practices in building ones, especially on handling real-time communication between IoT devices to the Internet. A framework is often used to fasten building IoT system. This paper present Mobile Internet of Things (MIOT), a framework which use a smartphone as the main component to handle communication between IoT device and the internet. A smartphone is used as the communication gateway (relay) for IoT devices and not as the IoT controller as in common Smartphone-IoT approach. For evaluation purpose, two implementations of IoT prototype scenario is built, an environmental monitoring and a remote controller (RC) car. The experiment shows a quick and easy deployment of IoT system. The Environment Monitoring able to send data to the server in real-time, and control The RC Car with a reasonable response time.</p><p><span>The experiment on 200 ms interval between each packet, shows that MIOT Framework has round-trip latency between MIOT Server and IoT hardware for ≈ 88.007 ms. The addition of smartphone as the main component in the framework (MIOT Apps) contribute to additional latency ≈ 13.145 ms. </span></p><p><span>Using a Smartphone as a gateway for IoT in MIOT Framework is possible and promising. It can be used as a best practice to develop a reliable IoT system which reduces time, effort, and learning overhead on building IoT systems.</span></p>


1994 ◽  
Vol 33 (01) ◽  
pp. 60-63 ◽  
Author(s):  
E. J. Manders ◽  
D. P. Lindstrom ◽  
B. M. Dawant

Abstract:On-line intelligent monitoring, diagnosis, and control of dynamic systems such as patients in intensive care units necessitates the context-dependent acquisition, processing, analysis, and interpretation of large amounts of possibly noisy and incomplete data. The dynamic nature of the process also requires a continuous evaluation and adaptation of the monitoring strategy to respond to changes both in the monitored patient and in the monitoring equipment. Moreover, real-time constraints may imply data losses, the importance of which has to be minimized. This paper presents a computer architecture designed to accomplish these tasks. Its main components are a model and a data abstraction module. The model provides the system with a monitoring context related to the patient status. The data abstraction module relies on that information to adapt the monitoring strategy and provide the model with the necessary information. This paper focuses on the data abstraction module and its interaction with the model.


2013 ◽  
Vol 773 ◽  
pp. 148-153 ◽  
Author(s):  
Juan Zhou ◽  
Bing Yan Chen ◽  
Meng Ni Zhang ◽  
Ying Ying Tang

Aiming at the management problem of real-time data created while intelligent solar street lamps working, sectional data acquisition and control system based on internet of things is introduced in the paper. Communication protocol with unified form and flexible function is designed in the system, and communication address is composed of sectional address and subsection address. Three-level data structure is built in the polling algorithm to trace real-time state of lamps and to detect malfunction in time, which is suitable for sectional lamps management characteristics. The system reflects necessary statistic data and exception information to remote control centre through GPRS to short interval expend on transmission and procession and save network flow and system energy. The result shows the system brings improved management affection and accords with the idea of energy-saving and environmental protection.


Sensors ◽  
2018 ◽  
Vol 18 (8) ◽  
pp. 2664 ◽  
Author(s):  
Luis Belem Pacheco ◽  
Eduardo Pelinson Alchieri ◽  
Priscila Mendez Barreto

The use of Internet of Things (IoT) is rapidly growing and a huge amount of data is being generated by IoT devices. Cloud computing is a natural candidate to handle this data since it has enough power and capacity to process, store and control data access. Moreover, this approach brings several benefits to the IoT, such as the aggregation of all IoT data in a common place and the use of cloud services to consume this data and provide useful applications. However, enforcing user privacy when sending sensitive information to the cloud is a challenge. This work presents and evaluates an architecture to provide privacy in the integration of IoT and cloud computing. The proposed architecture, called PROTeCt—Privacy aRquitecture for integratiOn of internet of Things and Cloud computing, improves user privacy by implementing privacy enforcement at the IoT devices instead of at the gateway, as is usually done. Consequently, the proposed approach improves both system security and fault tolerance, since it removes the single point of failure (gateway). The proposed architecture is evaluated through an analytical analysis and simulations with severely constrained devices, where delay and energy consumption are evaluated and compared to other architectures. The obtained results show the practical feasibility of the proposed solutions and demonstrate that the overheads introduced in the IoT devices are worthwhile considering the increased level of privacy and security.


2020 ◽  
pp. 1260-1284
Author(s):  
Laura Belli ◽  
Simone Cirani ◽  
Luca Davoli ◽  
Gianluigi Ferrari ◽  
Lorenzo Melegari ◽  
...  

The Internet of Things (IoT) is expected to interconnect billions (around 50 by 2020) of heterogeneous sensor/actuator-equipped devices denoted as “Smart Objects” (SOs), characterized by constrained resources in terms of memory, processing, and communication reliability. Several IoT applications have real-time and low-latency requirements and must rely on architectures specifically designed to manage gigantic streams of information (in terms of number of data sources and transmission data rate). We refer to “Big Stream” as the paradigm which best fits the selected IoT scenario, in contrast to the traditional “Big Data” concept, which does not consider real-time constraints. Moreover, there are many security concerns related to IoT devices and to the Cloud. In this paper, we analyze security aspects in a novel Cloud architecture for Big Stream applications, which efficiently handles Big Stream data through a Graph-based platform and delivers processed data to consumers, with low latency. The authors detail each module defined in the system architecture, describing all refinements required to make the platform able to secure large data streams. An experimentation is also conducted in order to evaluate the performance of the proposed architecture when integrating security mechanisms.


2020 ◽  
Vol 6 (Supplement_1) ◽  
pp. 58-58
Author(s):  
Lamech Sigu ◽  
Fredrick Chite ◽  
Emma Achieng ◽  
Andrew Koech

PURPOSE The Internet of Things (IoT) is a technology that involves all things connected to the Internet that share data over a network without requiring human-to-human interaction or human-to-computer interaction. Information collected from IoT devices can help physicians identify the best treatment process for patients and reach accurate and expected outcomes. METHODS The International Cancer Institute is partnering to set up remote oncology clinics in sub-Saharan Africa. Medical oncologists and expert teams from across the world connect with oncology clinics in other Kenyan counties—Kisumu, Meru, Makueni, Garissa, Kakamega, Bungoma, Siaya, and Vihiga counties. The furthest county is Garissa, approximately 651.1 km from Eldoret, and the nearest is Vihiga at 100.4 km from Eldoret. This study began July 2019, and as of November 30th, the team has hosted 21 sessions with an average of 11 participants attending a session led by a medical oncologist. RESULTS IoT devices have become a way by which a patient gets all the information he or she needs from a physician without going to the clinic. Patient monitoring can be done in real time, allowing access to real-time information with improved patient treatment outcomes and a decrease in cost. Through IoT-enabled devices, the International Cancer Institute has set up weekly virtual tumor boards during which cancer cases are presented and discussed by all participating counties. An online training module on cancer is also offered. Furthermore, remote monitoring of a patient’s health helps to reduce the length of hospital stay and prevents readmissions. CONCLUSION In our setting, which has a few oncologists, use of IoT and tumor boards has helped to improve patient decision support as well as training for general physicians.


2020 ◽  
Vol 1 (1-2) ◽  
pp. 27-37
Author(s):  
Stefan Hessel ◽  
Andreas Rebmann

Abstract IoT devices are omnipresent in children‘s rooms. At the same time these devices and their infrastructure have become notorious for security flaws. The following paper analyses current and future legal reglementation and IT security measures to protect children as an especially vulnerable group.


1996 ◽  
Vol 118 (1) ◽  
pp. 58-65 ◽  
Author(s):  
R. I. Milford ◽  
S. F. Asokanthan

This paper presents experimental results for the real-time adaptive identification and control of a flexible, slewing beam. A frequency domain identification algorithm incorporating non-parametric transfer function estimation and least squares parametric estimation is used to reconstruct an accurate parametric model of the system, capable of accurately tracking changing plant dynamics in real time. This model is subsequently used to produce an LQG compensator which actively damps beam vibration caused by rapid slewing manoeuvres with large payload changes. Non-persistent excitation is addressed in the context of identification during nominal motion. It is shown that after a short duration learning period, the proposed identification scheme will yield a model which is sufficiently accurate for controller synthesis.


2021 ◽  
Author(s):  
Priyanka Gupta ◽  
Lokesh Yadav ◽  
Deepak Singh Tomar

The Internet of Things (IoT) connects billions of interconnected devices that can exchange information with each other with minimal user intervention. The goal of IoT to become accessible to anyone, anytime, and anywhere. IoT has engaged in multiple fields, including education, healthcare, businesses, and smart home. Security and privacy issues have been significant obstacles to the widespread adoption of IoT. IoT devices cannot be entirely secure from threats; detecting attacks in real-time is essential for securing devices. In the real-time communication domain and especially in IoT, security and protection are the major issues. The resource-constrained nature of IoT devices makes traditional security techniques difficult. In this paper, the research work carried out in IoT Intrusion Detection System is presented. The Machine learning methods are explored to provide an effective security solution for IoT Intrusion Detection systems. Then discussed the advantages and disadvantages of the selected methodology. Further, the datasets used in IoT security are also discussed. Finally, the examination of the open issues and directions for future trends are also provided.


2020 ◽  
Vol 17 (1) ◽  
pp. 141-160
Author(s):  
Bojan Marinkovic ◽  
Zoran Ognjanovic ◽  
Paola Glavan ◽  
Anton Kos ◽  
Anton Umek

Internet of Things (IoT) can be seen as a cooperation of various devices with limited performances that participate in the same system. IoT devices compose a distributed architecture system. The core of every IoT system is its discovery and control services. To realize such services, some authors used the developed solutions from the different domains. One such solution is the Chord protocol, one of the first, the simplest and the most popular distributed protocols. Unfortunately, the application of the Chord protocol was realized using the correctness of the Chord protocol for granted, or by the very hard assumptions. In this paper we prove the correctness of the Chord protocol using the logic of time and knowledge with the respect to the set of possible executions, called regular runs. We provide the deterministic description of the correctness of the Chord protocol and consider Chord actions that maintain ring topology while the nodes can freely join or leave.


Sign in / Sign up

Export Citation Format

Share Document