scholarly journals An MQTT Brokers Distribution Based on Mist Computing for Real-Time IoT Communications

Author(s):  
Fatma Hmissi ◽  
Sofiane Ouni

Abstract As we consider the number of IoT time-sensitive applications , the transfer of data to a remote data center and server such as Cloud, Fog, and Edge becomes inefficient since the deadline constraint is not satisfied. Thus, ensuring that the IoT time-sensitive applications meet their timing constraints is a challenge. Mist Computing is closer to IoT devices, presenting the lowest communication delay but less computational resource than the Cloud, Fog, and Edge. Seeing several IoT devices use MQTT protocol to access the data due to its lightness and flexibility, we propose an architecture for IoT time-sensitive applications based on MQTT protocol and integrating Mist Computing. We focus on distributing the MQTT brokers over Mist nodes to satisfy the deadline constraints with the consideration of the limited resource of Mist nodes. Hence, we propose an approach for the selection of the appropriate MQTT Mist broker. We have also proposed MQTT communication model that provides the M/M/1 based analysis for delay computing and energy conception. The experiment results show that our proposal is very effective for time-sensitive applications and also maximize the lifetime of IoT systems since it minimizes the cumulative energy of the system. Compared to MQTT Edge broker distribution, our solution provides the lesser delay of communication between IoT devices.

2021 ◽  
Vol 9 (2) ◽  
pp. 527-540
Author(s):  
Nikhil Subhash Patankar, Et. al.

The open stack communication protocol of the internet of things always in security threats. The vulnerability of protocol faces a problem of man in middle attacks and loss of integrity of communication. Cryptography plays a vital role in security authentication on IoT based enable communication system.  IoT devices' limited resource constraints cannot offer any security mechanism on the physical level and network level. The key generation methods uplift the security provision in IoT enables communication model. The process of key generation applied three types of cryptography algorithm, symmetric, asymmetric and hybrid algorithm. The complexity of key generation methods needs more computational time and memory; this is the limitation of IoT devices. So various authors proposed a lightweight key generation algorithm for security and authentication. This paper analyzed the performance of key generation methods based on different cryptography approaches and measured their security strength. For the analysis process, use MATLAB software and sample text data file for the communication of two parties. Some ADHOC methods apply to measure protocol weakness during the communication network compromised with a man in the middle attack.  The variable key size also reflects the security strength of IoTs enable devices.


Author(s):  
Muhammad Fahmi Ali Fikri ◽  
Dany Primanita Kartikasari ◽  
Adhitya Bhawiyuga

Sensor data acquisition is used to obtain sensor data from IoT devices that already provide the required sensor data. To acquire sensor data, we can use Bluetooth Low Energy (BLE) protocol. This data acquisition aims to process further data which will later be sent to the server. Bluetooth Low Energy (BLE) has an architecture consisting of sensors, gateways, and data centers, but with this architecture, there are several weaknesses, namely the failure when sending data to the data center due to not being connected to internet network and data redundancy at the time of data delivery is done. The proposed solution to solve this problem is to create a system that can acquire sensor data using the Bluetooth Low Energy (BLE) protocol with use a store and forward mechanism and checking data redundancy. The proposed system will be implemented using sensors from IoT devices, the gateway used is Android devices, and using the Bluetooth Low Energy protocol to acquire data from sensors. Then the data will be sent to the cloud or server. The results of the test give the results of the system being successfully implemented and IoT devices can be connected to the gateway with a maximum distance of 10 meters. Then when the system stores, for every minute there is an increase in data of 4 kb. Then there is no data redundancy in the system.


2018 ◽  
pp. 1-4
Author(s):  
Daniele Checci ◽  
Janet Gornick

The articles included in this special issue of the Journal of Income Distribution are a selection of papers originally presented at the first LIS-LWS Users Conference, hosted by LIS, the cross-national data center in Luxembourg. The conference took place at the University of Luxembourg in Belval, Luxembourg, on April 27- 28, 2017. The submitted papers underwent a process of blind review, and this collection of five articles is the final outcome. Taken as a whole, these articles constitute an interesting overview of the ways in which the research community uses the LIS-LWS Databases, which provide researchers access to microdata on income and wealth, respectively.


2020 ◽  
Vol 19 (03) ◽  
pp. 741-773
Author(s):  
Siamak Kheybari ◽  
Mansoor Davoodi Monfared ◽  
Hadis Farazmand ◽  
Jafar Rezaei

In this paper, a multi-criteria set-covering methodology is proposed to select suitable locations for a set of data centers. First, a framework of criteria, with social, economic and environmental dimensions, is presented. The framework is used to calculate the suitability of potential data center locations in Iran. To that end, a sample of specialists in Iran was asked to take part in an online questionnaire, based on best–worst method (BWM), to determine the weight of the criteria included in the proposed framework, after which a number of potential locations are evaluated on the basis of the criteria. The proposed model is evaluated under a number of settings. Using the proposed multi-criteria set-covering model, not only the utility of candidate places is evaluated by sustainability criteria but also all service applicants are covered by at least one data center with a specific coverage radius.


2019 ◽  
Vol 13 (3) ◽  
pp. 2898-2905 ◽  
Author(s):  
Sudip Misra ◽  
Ayan Mondal ◽  
Swetha Khajjayam

2018 ◽  
Vol 22 (2) ◽  
pp. 253-258 ◽  
Author(s):  
Jesper Falkheimer ◽  
Katarina Gentzel Sandberg

Purpose The purpose of this paper is to describe strategic improvisation, a contemporary concept and approach based on the creative arts and organizational crisis theory, as a valuable approach for communication professionals. Strategic improvisation combines the need for planning and structure with creative action, and is a normative idea of how to work in an efficient way. Design/methodology/approach The concept is developed in a collaborative project between a major Swedish communications agency and a university scholar. The empirical foundation consists of 25 qualitative interviews with a strategic selection of successful communication professionals, identified as typical strategic improvisers. Findings An analysis of the interviews led to 11 defining patterns or themes typical for strategic improvisation and strategic improvisers. The interviews and the theoretical framework is the foundation of a communication model. Strategic improvisation is defined as a situational interpretation within a given framework. The model has three interconnected parts: a clear framework (composition), a professional interpretation (interpretation) and a situational adaptation based on given possibilities and conditions (improvisation). Research limitations/implications This is not a peer reviewed paper, but a paper in the section “In Practice,” directed toward communication professionals. Originality/value The ideas and model are connected to theories of improvisation, especially in music, which is rare in the field of communication management, and developed in a collaborative project between practice and research.


2020 ◽  
Vol 11 (4) ◽  
pp. 17-30
Author(s):  
Shefali Varshney ◽  
Rajinder Sandhu ◽  
P. K. Gupta

Application placement in the fog environment is becoming one of the major challenges because of its distributed, hierarchical, and heterogeneous nature. Also, user expectations and various features of IoT devices further increase the complexity of the problem for the placement of applications in the fog computing environment. Therefore, to improve the QoE of various end-users for the use of various system services, proper placement of applications in the fog computing environment plays an important role. In this paper, the authors have proposed a service placement methodology for the fog computing environment. For a better selection of application services, AHP technique has been used which provides results in the form of ranks. The performance evaluation of the proposed technique has been done by using a customized testbed that considers the parameters like CPU cycle, storage, maximum latency, processing speed, and network bandwidth. Experimental results obtained for the proposed methodology improved the efficiency of the fog network.


2020 ◽  
Vol 81 (6) ◽  
pp. 32-41
Author(s):  
L. O. Butakova

The study is aimed at assessing communicative, semantic and structural aspects of schoolchildren’s text-based activity; determining the actual semantic structure of the conceptual area connected with an old age, as well as the types of vocal acts applied to verbalisation of senses in the process of extemporaneous written speech production. Resources: texts of the compositions «An old man, what is he?»; «Old age, what is it?», «In old age I will be...», written by seventh- grade Russian students in Omsk in 2020. The applied methodology involves complex analysis for identifying communicative (speech strategies and tactics, type of communication), cognitive (actualisation of meaning and cognitive structures), semantic (selection of words, distribution of subjective features, selection of predicates, etc.) parameters. Results of the research: the author reveals certain dominance of variably developing typical scenarios associated with specific cognitive fragments in the linguistic consciousness as well as particular impact of social stereotypes associated with age, old age, old person. The author comes to the following conclusions: competence in communicative norms and structure of reasoning, predominance of self-communication, lack of dependence between the choice of the communication model and stating of the topic; actual semantic spaces and cognitive structures in the old age conceptual area: family – «love for children and grandchildren, care, help» / «abandonment»; lifestyle – «physical and intellectual activity », «health» / «lack of interest», «illness»; life as past – present – future – «work, money, business», «joy, fun, pleasure », «sadness, weakness»; a person – «different types of elderly people», «optimism» / «grumpiness», «experience», «wisdom»; the nature of the written speech actions consists in endowing with quality, transferring the activity of the subject – a person and his age state with the help of a restricted vocabulary basic for the semantic field of age (elderly, old, an old man, grandmother, grandfather, getting old); presentation of stereotypes of a multi-generational family and mutual care traditional for Russian culture, as well as formation of new stereotypes of active, joyful and happy old age.


Sign in / Sign up

Export Citation Format

Share Document