scholarly journals Probabilistic Model for the Lifetime Prediction of IoT Devices

Author(s):  
Felipe Pinheiro Correia ◽  
Marcelo Alencar ◽  
Karcius Assis

Abstract The development of new electronics and communications technologies allows the Internet of Things (IoT) concepts to be put into practice. A large amount of information is expected to travel over the internet from intelligent objects to many different kinds of software and cloud computing applications. However, there are still several challenges to be overcome. Among them, management of devices energy consumption is intriguing. Therefore, a model to estimate the range of probabilities of the energy spent by IoT equipment is presented in this work. The results include the formulation of probability distributions and discrete event simulations. The proposed method can be applied to design and evaluate IoT applications.

2021 ◽  
Vol 9 (2) ◽  
Author(s):  
Feroz Khan A.B ◽  
◽  
Anandharaj G ◽  

The smart devices connected on the internet turn to be the internet of things, which connect other objects or devices through unique identifiers with the capability of transferring and receiving the information over the internet. There are numerous applications in different areas such as healthcare, home automation, transportation, military, agriculture, and still so many sectors that incorporate cutting-edge technologies of communication, networking, cloud computing, sensing, and actuation. With this huge increase in the number of connected devices, a strong security mechanism is required to protect the IoT devices. Hence, it is required to focus on the challenges and issues of IoT enabled applications to safeguard the entire network from the outside invasion. This paper discusses some of the challenges in building IoT applications, a detailed study of the existing security protocols, and its issues, and the potential of the IoT.


Electronics ◽  
2018 ◽  
Vol 7 (11) ◽  
pp. 309 ◽  
Author(s):  
Hind Bangui ◽  
Said Rakrak ◽  
Said Raghay ◽  
Barbora Buhnova

Cloud computing has significantly enhanced the growth of the Internet of Things (IoT) by ensuring and supporting the Quality of Service (QoS) of IoT applications. However, cloud services are still far from IoT devices. Notably, the transmission of IoT data experiences network issues, such as high latency. In this case, the cloud platforms cannot satisfy the IoT applications that require real-time response. Yet, the location of cloud services is one of the challenges encountered in the evolution of the IoT paradigm. Recently, edge cloud computing has been proposed to bring cloud services closer to the IoT end-users, becoming a promising paradigm whose pitfalls and challenges are not yet well understood. This paper aims at presenting the leading-edge computing concerning the movement of services from centralized cloud platforms to decentralized platforms, and examines the issues and challenges introduced by these highly distributed environments, to support engineers and researchers who might benefit from this transition.


Subject IoT ecosystem. Significance The market for the Internet of Things (IoT) or connected devices is expanding rapidly, with no manufacturer currently forecast to dominate the supply chain. This has fragmented the emerging IoT ecosystem, triggering questions about interoperability and cybersecurity of IoT devices. Impacts Firms in manufacturing, transportation and logistics and utilities are expected to see the highest IoT spending in coming years. The pace of IoT adoption is inextricably linked to that of related technologies such as 5G, artificial intelligence and cloud computing. Data privacy and security will be the greatest constraint to IoT adoption.


2018 ◽  
Vol 38 (1) ◽  
pp. 121-129 ◽  
Author(s):  
Pablo Antonio Pico Valencia ◽  
Juan A. Holgado-Terriza ◽  
Deiver Herrera-Sánchez ◽  
José Luis Sampietro

Recently, the scientific community has demonstrated a special interest in the process related to the integration of the agent-oriented technology with Internet of Things (IoT) platforms. Then, it arises a novel approach named Internet of Agents (IoA) as an alternative to add an intelligence and autonomy component for IoT devices and networks. This paper presents an analysis of the main benefits derived from the use of the IoA approach, based on a practical point of view regarding the necessities that humans demand in their daily life and work, which can be solved by IoT networks modeled as IoA infrastructures. It has been presented 24 study cases of the IoA approach at different domains ––smart industry, smart city and smart health wellbeing–– in order to define the scope of these proposals in terms of intelligence and autonomy in contrast to their corresponding generic IoT applications.


2019 ◽  
Vol 11 (6) ◽  
pp. 127 ◽  
Author(s):  
Michele De Donno ◽  
Alberto Giaretta ◽  
Nicola Dragoni ◽  
Antonio Bucchiarone ◽  
Manuel Mazzara

The Internet of Things (IoT) is rapidly changing our society to a world where every “thing” is connected to the Internet, making computing pervasive like never before. This tsunami of connectivity and data collection relies more and more on the Cloud, where data analytics and intelligence actually reside. Cloud computing has indeed revolutionized the way computational resources and services can be used and accessed, implementing the concept of utility computing whose advantages are undeniable for every business. However, despite the benefits in terms of flexibility, economic savings, and support of new services, its widespread adoption is hindered by the security issues arising with its usage. From a security perspective, the technological revolution introduced by IoT and Cloud computing can represent a disaster, as each object might become inherently remotely hackable and, as a consequence, controllable by malicious actors. While the literature mostly focuses on the security of IoT and Cloud computing as separate entities, in this article we provide an up-to-date and well-structured survey of the security issues of cloud computing in the IoT era. We give a clear picture of where security issues occur and what their potential impact is. As a result, we claim that it is not enough to secure IoT devices, as cyber-storms come from Clouds.


Author(s):  
Rahul Verma

The internet of things (IoT) is the new buzzword in technological corridors with most technology companies announcing a smart device of sorts that runs on internet of things (IoT). Cities around the world are getting “smarter” every day through the implementation of internet of things (IoT) devices. Cities around the world are implementing individual concepts on their way to becoming smart. The services are automated and integrated end to end using internet of things (IoT) devices. The chapter presents an array of internet of things (IoT) applications. Also, cyber physical systems are becoming more vulnerable since the internet of things (IoT) attacks are common and threatening the security and privacy of such systems. The main aim of this chapter is to bring more research in the application aspects of smart internet of things (IoT).


Author(s):  
Kamalendu Pal

The internet of things (IoT) is ushering a new age of technology-driven automation of information systems into the manufacturing industry. One of the main concerns with IoT systems is the lack of privacy and security preserving schemes for controlling access and ensuring the safety of the data. Many security issues arise because of the centralized architecture of IoT-based information systems. Another concern is the lack of appropriate authentication and access control schemes to moderate the access to information generated by the IoT devices in the manufacturing industry. Hence, the question that arises is how to ensure the identity of the manufacturing machinery or the communication nodes. This chapter presents the advantages of blockchain technology to secure the operation of the modern manufacturing industry in a trustless environment with IoT applications. The chapter reviews the challenges and threats in IoT applications and how integration with blockchain can resolve some of the manufacturing enterprise information systems (EIS).


2019 ◽  
Vol 8 (3) ◽  
pp. 2356-2363

Nowadays, with the quick development of internet and cloud technologies, a big number of physical objects are linked to the Internet and every day, more objects are connected to the Internet. It provides great benefits that lead to a significant improvement in the quality of our daily life. Examples include: Smart City, Smart Homes, Autonomous Driving Cars or Airplanes and Health Monitoring Systems. On the other hand, Cloud Computing provides to the IoT systems a series of services such as data computing, processing or storage, analysis and securing. It is estimated that by the year 2025, approximately trillion IoT devices will be used. As a result, a huge amount of data is going to be generated. In addition, in order to efficiently and accurately work, there are situations where IoT applications (such as Self Driving, Health Monitoring, etc.) require quick responses. In this context, the traditional Cloud Computing systems will have difficulties in handling and providing services. To balance this scenario and to overcome the drawbacks of cloud computing, a new computing model called fog computing has proposed. In this paper, a comparison between fog computing and cloud computing paradigms were performed. The scheduling task for an IoT application in a cloud-fog computing system was considered. For the simulation and evaluation purposes, the CloudAnalyst simulation toolkit was used. The obtained numerical results showed the fog computing achieves better performance and works more efficient than Cloud computing. It also reduced the response time, processing time ,and cost of transfer data to the cloud.


Author(s):  
Sreelakshmi K. K. ◽  
Ashutosh Bhatia ◽  
Ankit Agrawal

The internet of things (IoT) has become a guiding technology behind automation and smart computing. One of the major concerns with the IoT systems is the lack of privacy and security preserving schemes for controlling access and ensuring the security of the data. A majority of security issues arise because of the centralized architecture of IoT systems. Another concern is the lack of proper authentication and access control schemes to moderate access to information generated by the IoT devices. So the question that arises is how to ensure the identity of the equipment or the communicating node. The answer to secure operations in a trustless environment brings us to the decentralized solution of Blockchain. A lot of research has been going on in the area of convergence of IoT and Blockchain, and it has resulted in some remarkable progress in addressing some of the significant issues in the IoT arena. This work reviews the challenges and threats in the IoT environment and how integration with Blockchain can resolve some of them.


2021 ◽  
Vol 9 (1) ◽  
pp. 912-931
Author(s):  
Pavan Madduru

To meet the growing demand for mobile data traffic and the stringent requirements for Internet of Things (IoT) applications in emerging cities such as smart cities, healthcare, augmented / virtual reality (AR / VR), fifth-generation assistive technologies generation (5G) Suggest and use on the web. As a major emerging 5G technology and a major driver of the Internet of Things, Multiple Access Edge Computing (MEC), which integrates telecommunications and IT services, provides cloud computing capabilities at the edge of an access network. wireless (RAN). By providing maximum compute and storage resources, MEC can reduce end-user latency. Therefore, in this article we will take a closer look at 5G MEC and the Internet of Things. Analyze the main functions of MEC in 5G and IoT environments. It offers several core technologies that enable the use of MEC in 5G and IoT, such as cloud computing, SDN / NFV, information-oriented networks, virtual machines (VMs) and containers, smart devices, shared networks and computing offload. This article also provides an overview of MEC's ​​role in 5G and IoT, a detailed introduction to MEC-enabled 5G and IoT applications, and future perspectives for MEC integration with 5G and IoT. Additionally, this article will take a closer look at the MEC research challenges and unresolved issues around 5G and the Internet of Things. Finally, we propose a use case that MEC uses to obtain advanced intelligence in IoT scenarios.


Sign in / Sign up

Export Citation Format

Share Document