scholarly journals Cloud-based Middleware for Syntactical Interoperability in Internet of Things

2020 ◽  
Vol 5 (1) ◽  
pp. 32
Author(s):  
Eko Sakti Pramukantoro ◽  
Fariz Andri Bakhtiar

Heterogeneity of protocol communications, data formats, data structure, and hardware specifications on the Internet of things can lead to an Interoperability problem. The solution provides middleware that capable to work in heterogeneity communications, data formats, etc. This paper proposed. A cloud-based middleware that provides a communication interface to receive data from sensor nodes based on Restful and CoAP. Received data then stored in heterogenous IoT data storage based on the NoSQL database. From experiment and testing, interoperability testing methodology was used. The result shows proposed middleware can receive data from both protocols. The received data could store based on structure data or unstructured data on IoT data storage.

2018 ◽  
Vol 6 (3) ◽  
pp. 359-363
Author(s):  
A. Saxena ◽  
◽  
S. Sharma ◽  
S. Dangi ◽  
A. Sharma ◽  
...  

Author(s):  
Hala A. Naman ◽  
Naseer Ali Hussien ◽  
Mohand Lokman Al-dabag ◽  
Haider Th.Salim Alrikabi

<p class="0abstract">One of the unexpected intelligence tactics known in World War II was to conceal the data in images that were reduced to the size of a point that was used in every text and transported in front of the enemy's eyes. In the new age, and after the expansion of Internet science and the use of the Internet worldwide, we will establish a security feature of the IOT service that will work more reliably and more effectively to deal with the Internet of Things and ensure the work of the services that the customer interacts with. A secret-key stenographic scheme that embeds four gray-scale secret size (128*128) pixel images into a size (512*512) pixel cover image in this work. Wavelet transform is the method used in this project to analyze the cover into its frequency components. In this work, combinations of steganography and cryptography were made to increase the level of safety and make the device more difficult for attackers to beat. The resulting stego-image that will be transmitted did not raise any suspicion by both objective and subjective evaluation, so the primary objective of Steganography is achieved. The proposed system was designed by using (MATLAB R2018b) and running on a Pentium-4 computer. The Internet of Things works with the encryption system for data in a synchronized manner with the technological development, and in order to maintain the stability of any Internet of things service, whether it is information signal services, visual or audio data, a remote control system, or data storage in the Internet cloud, we must focus on data preservation from internet pirates and internet system hackers. The picture Figure<strong> </strong>4 below shows the method of encryption and dealing with the Internet of things system..</p>


2012 ◽  
Vol 197 ◽  
pp. 649-655
Author(s):  
Jian Hua Liu ◽  
Wei Qin Tong

Internet of things applications using RFID sensors are a challenging task due to the limited capacity of batteries. Thus, energy efficient updating and maintenance have become more critical design with RFID sensor network. This paper is dedicated to combine energy harvesting and maintenance, sensor network, and resource discovery to develop a rechargeable sensor energy maintenance scheme. To deal with key sensor nodes and low energy path maintenance, the proposed approach consists of the following:(1)key point energy maintenance for RFID sensor through multi-path similarity analysis;(2)path energy maintenance for RFID sink through energy resource discovery. Use case application and simulation results show that the proposed methods reduce key sensor nodes energy maintenance time and energy maintenance path length for sensor nodes energy updating and maintenance.


2020 ◽  
Vol 76 (11) ◽  
pp. 8529-8547
Author(s):  
Yuntao Duan ◽  
Jiangdai Li ◽  
Gautam Srivastava ◽  
Jyh-Haw Yeh

Author(s):  
Zhiyao Fan ◽  
Tianhong Pan ◽  
Li Ma

In order to increase the management efficiency and decrease the maintenance costs in the traditional dust monitoring system, a novel real-time remote monitoring system using the Internet of Things and cloud server is proposed in this paper. The system includes several sensor nodes, a sink node and Cloud Server. The high-precision dust probe, temperature and humidity sensors, water flow sensors and hydrogen transmitters are integrated together into a sensor node to access the metal polished environmental information. Then, the collected information is transmitted to sink-node using the 2.4G wireless network. The sink-node uploads data to the Cloud Server through the 4G network and TCP Socket. Based on the Browser/Server (B/S) model, a remote monitoring system is developed by using Tencent Cloud Server, C# language, and SQL database. As a result, the on-site metal polishing environmental information is obtained via the App and Web page.


2012 ◽  
Vol 452-453 ◽  
pp. 932-936
Author(s):  
Xiang Dong Hu ◽  
Peng Qin Yu

With the rapid development of ubiquitous network and its applications, the key technologies of the Internet of things are actively researched all over the world. The Internet of things has tremendous attraction for adversaries, and it is easily attacked due to poor resource and non-perfect distribution of sensor nodes, then false data maybe be injected into network. Security is one of the most important demands for applications in the Internet of things, an algorithm of malicious nodes detection is proposed to protect the network from destruction based on weighted confidence filter, namely, the cluster heads take charge of collecting messages from nodes and computing their average of confidence in cluster-based network, then they aggregate data from nodes with higher confidence than average and ignore the others, they update confidence of each node by comparing the aggregation value and the received data, and regard it as the weight of exactness of message from node. A sensor node is judged to be a malicious one if its weight is lower than the set threshold. The simulation results show that the algorithm can detect malicious nodes with high detection ratio, low false alarm ratio and outstanding scalability.


Author(s):  
Matt Zwolenski ◽  
Lee Weatherill

The Digital Universe, which consists of all the data created by PC, Sensor Networks, GPS/WiFi Location, Web Metadata, Web-Sourced Biographical Data, Mobile, Smart-Connected Devices and Next-Generation Applications (to name but a few) is altering the way we consume and measure IT and disrupting proven business models. Unprecedented and exponential data growth is presenting businesses with new and unique opportunities and challenges. As the ‘Internet of Things’ (IoT) and Third Platform continue to grow, the analysis of structured and unstructured data will drive insights that change the way businesses operate, create distinctive value, and deliver services and applications to the consumer and to each other. As enterprises and IT grapple to take advantage of these trends in order to gain share and drive revenue, they must be mindful of the Information Security and Data Protection pitfalls that lay in wait ─ hurdles that have already tripped up market leaders and minnows alike.


2020 ◽  
Author(s):  
Jaimon T Kelly ◽  
Katrina L Campbell ◽  
Enying Gong ◽  
Paul Scuffham

UNSTRUCTURED The Internet of Things (IoT) is a system of wireless, interrelated, and connected digital devices that can collect, send, and store data over a network without requiring human-to-human or human-to-computer interaction. The IoT promises many benefits to streamlining and enhancing health care delivery to proactively predict health issues and diagnose, treat, and monitor patients both in and out of the hospital. Worldwide, government leaders and decision makers are implementing policies to deliver health care services using technology and more so in response to the novel COVID-19 pandemic. It is now becoming increasingly important to understand how established and emerging IoT technologies can support health systems to deliver safe and effective care. The aim of this viewpoint paper is to provide an overview of the current IoT technology in health care, outline how IoT devices are improving health service delivery, and outline how IoT technology can affect and disrupt global health care in the next decade. The potential of IoT-based health care is expanded upon to theorize how IoT can improve the accessibility of preventative public health services and transition our current secondary and tertiary health care to be a more proactive, continuous, and coordinated system. Finally, this paper will deal with the potential issues that IoT-based health care generates, barriers to market adoption from health care professionals and patients alike, confidence and acceptability, privacy and security, interoperability, standardization and remuneration, data storage, and control and ownership. Corresponding enablers of IoT in current health care will rely on policy support, cybersecurity-focused guidelines, careful strategic planning, and transparent policies within health care organizations. IoT-based health care has great potential to improve the efficiency of the health system and improve population health.


Sign in / Sign up

Export Citation Format

Share Document