A COMPREHENSIVE STUDY ON MACHINE TO MACHINE RESOURCE AND SERVICE DISCOVERY IN INTERNET OF THINGS

2018 ◽  
Vol 18 (1) ◽  
pp. 55-83
Author(s):  
Firas Albalas ◽  
Wail Mardini ◽  
Majd Al-Soud
Author(s):  
Shreya Joshi ◽  
Ms Bhavyaa ◽  
Suhani Gupta ◽  
Lalita Luthra

Blockchain is considered to be a disruptive core technology. Although many researchers have realized the importance of blockchain, but the research of it is still emerging. It is the record-keeping technology behind bitcoin and is one of the hottest and fastest growing skills in the IT sector today. It serves as an immutable ledger which allows transactions to take place in a decentralized man Blockchain-based applications are rising up, covering numerous fields including finance, healthcare, product management, Internet of Things (IoT), and many more. However, there are still some challenges of blockchain technology such as scalability and security problems which need to be overcome. This paper comprises of a comprehensive study of Blockchain technology. We have included here a deep dive into how blockchains work, its architecture, consensus and various applications. Furthermore, technical challenges are briefly listed.


2020 ◽  
Author(s):  
Navod Neranjan Thilakarathne ◽  
Mohan Krishna Kagita ◽  
Thippa Reddy Gadekallu

2017 ◽  
Vol 2017 ◽  
pp. 1-13 ◽  
Author(s):  
Yulong Fu ◽  
Zheng Yan ◽  
Jin Cao ◽  
Ousmane Koné ◽  
Xuefei Cao

Internet of Things (IoT) transforms network communication to Machine-to-Machine (M2M) basis and provides open access and new services to citizens and companies. It extends the border of Internet and will be developed as one part of the future 5G networks. However, as the resources of IoT’s front devices are constrained, many security mechanisms are hard to be implemented to protect the IoT networks. Intrusion detection system (IDS) is an efficient technique that can be used to detect the attackers when cryptography is broken, and it can be used to enforce the security of IoT networks. In this article, we analyzed the intrusion detection requirements of IoT networks and then proposed a uniform intrusion detection method for the vast heterogeneous IoT networks based on an automata model. The proposed method can detect and report the possible IoT attacks with three types: jam-attack, false-attack, and reply-attack automatically. We also design an experiment to verify the proposed IDS method and examine the attack of RADIUS application.


Author(s):  
Syed Husain ◽  
Athul Prasad ◽  
Andreas Kunz ◽  
Apostolos Papageorgiou ◽  
JaeSeung Song

2019 ◽  
pp. 1393-1406
Author(s):  
Dmitry Namiot ◽  
Manfred Sneps-Sneppe

In this paper, the authors discuss Internet of Things educational programs for universities. The authors' final goal is to provide a structure for a new educational course for Internet of Things and related areas such as Machine to Machine communications and Smart Cities. The Internet of Things skills are in high demands nowadays and, of course, Internet of Things models, as well as appropriate Big Data proceedings elements should have a place in the university courses. The purpose of the proposed educational course is to cover information and communication technologies used in Internet of Things systems and related areas, such as Smart Cities. The educational course proposed in this paper aims to introduce students to modern information and communication technologies and create the formation of competencies needed for such areas as Machine to Machine communications, Internet of Things, and Smart Cities. Also, the authors discuss Big Data issues for IoT course and explain the importance of data engineering.


Sign in / Sign up

Export Citation Format

Share Document