scholarly journals Object Authentication in the Context of the Internet of Things: A Survey

Author(s):  
Maha Saadeh ◽  
Azzam Sleit ◽  
Khair Eddin Sabri ◽  
Wesam Almobaideen

Internet of Things (IoT) is considered as the future of the Internet that connects billions of objects all together. Trusted communication between these objects is a crucial requirement for the wide deployment of IoT services. Consequently, effective authentication procedures should be applied between the communicating objects. This paper provides a comprehensive survey of object authentication in the IoT. The survey aims to direct future researchers in the field of IoT object authentication by delving into the details of authentication schemes and going through different comparisons. Comparisons are based on various criteria which include authentication process characteristics, the underlying architecture, key generation and distribution techniques, supporting IoT challenges, security analysis, and performance evaluation. Additionally, this survey highlights the main issues and challenges of IoT objects authentication and recommends future research directions.

Author(s):  
Lokesh B Bhajantri ◽  
Gangadharaiah S.

Efficient resource management is a challenging task in distributed systems, such as the Internet of Things, fog, edge, and cloud computing. In this work, we present a broad overview of the Internet of Things ecosystem and of the challenges related to managing its resources. We also investigate the need for efficient resource management and the guidelines given/suggested by Standard Development Organizations. Additionally, this paper contains a comprehensive survey of the individual phases of resource management processes, focusing on resource modeling, resource discovery, resource estimation, and resource allocation approaches based on performance parameters or metrics, as well as on architecture types. This paper presents also the architecture of a generic resource management enabler. Furthermore, we present open issues concerning resource management, pointing out the directions of future research related to the Internet of Things.


2019 ◽  
Vol 20 (4) ◽  
pp. 607-630 ◽  
Author(s):  
Tausifa Jan Saleem ◽  
Mohammad Ahsan Chishti

The plethora of sensors deployed in Internet of Things (IoT) environments generate unprecedented volumes of data, thereby creating a data deluge. Data collected from these sensors can be used to comprehend, examine and control intricate environments around us, facilitating greater intelligence, smarter decision-making, and better performance. The key challenge here is how to mine out proficient information from such immense data. Copious solutions have been put forth to obtain valuable inferences and insights, however, these solutions are still in their developing stages. Moreover, conventional procedures do not address the surging analytical demands of IoT systems. Motivated to resolve this concern, this work investigates the key enablers for performing desired data analytics in IoT applications. A comprehensive survey on the identified key enablers including their role in IoT data analytics, use cases in which they have been applied and the corresponding IoT applications for the use cases is presented. Furthermore, open research challenges and future research opportunities are also discussed. This article can be used as a basis to foster advanced research in the arena of IoT data analytics.


2012 ◽  
Vol 198-199 ◽  
pp. 1755-1760 ◽  
Author(s):  
Guo Ping Zhou ◽  
Ya Nan Chen

Applying the Internet of Things (IOT) into ecological environmental monitoring is the goal of this paper. There are several advantages of the Internet of Things (IOT) applying in ecological environment monitoring. A hierarchical monitoring system is presented, including system architecture, hardware/software design, information flow and software implementation. In the end, using carbon dioxide gas in the atmosphere for experimental purposes, in data collection and analysis. Experiments showed that this system is capable of monitoring ecologica environment, which orientate the future research of forest ecosystem.


Author(s):  
Zhiping Wang ◽  
Xinxin Zheng ◽  
Zhichen Yang

The Internet of Things (IoT) technology is an information technology developed in recent years with the development of electronic sensors, intelligence, network transmission and control technologies. This is the third revolution in the development of information technology. This article aims to study the algorithm of the Internet of Things technology, through the investigation of the hazards of athletes’ sports training, scientifically and rationally use the Internet of Things technology to collect data on safety accidents in athletes’ sports training, thereby reducing the risk of athletes’ sports training and making athletes better. In this article, the methods of literature research, analysis and condensing, questionnaire survey, theory and experiment combination, etc., investigate the safety accident data collection of the Internet of Things technology in athletes’ sports training, and provide certain theories and methods for future in-depth research practice basis. The experimental results in this article show that 82% of athletes who are surveyed under the Internet of Things technology will have partial injuries during training, reducing the risk of safety accidents in athletes’ sports training, and better enabling Chinese athletes to achieve a consistent level of competition and performance through a virtuous cycle of development.


2022 ◽  
Vol 54 (7) ◽  
pp. 1-34
Author(s):  
Sophie Dramé-Maigné ◽  
Maryline Laurent ◽  
Laurent Castillo ◽  
Hervé Ganem

The Internet of Things is taking hold in our everyday life. Regrettably, the security of IoT devices is often being overlooked. Among the vast array of security issues plaguing the emerging IoT, we decide to focus on access control, as privacy, trust, and other security properties cannot be achieved without controlled access. This article classifies IoT access control solutions from the literature according to their architecture (e.g., centralized, hierarchical, federated, distributed) and examines the suitability of each one for access control purposes. Our analysis concludes that important properties such as auditability and revocation are missing from many proposals while hierarchical and federated architectures are neglected by the community. Finally, we provide an architecture-based taxonomy and future research directions: a focus on hybrid architectures, usability, flexibility, privacy, and revocation schemes in serverless authorization.


2019 ◽  
Vol 21 (2) ◽  
pp. 1676-1717 ◽  
Author(s):  
Muhammad Salek Ali ◽  
Massimo Vecchio ◽  
Miguel Pincheira ◽  
Koustabh Dolui ◽  
Fabio Antonelli ◽  
...  

2019 ◽  
Vol 92 ◽  
pp. 101744 ◽  
Author(s):  
George Margelis ◽  
Xenofon Fafoutis ◽  
George Oikonomou ◽  
Robert Piechocki ◽  
Theo Tryfonas ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document