scholarly journals Device-to-Device Communications in Cloud, MANET and Internet of Things Integrated Architecture

2020 ◽  
Author(s):  
Tanweer Alam

Background: The wireless networks make it easier for users to connect with each other in the sense of the Internet of Things (IoT) system. The cloud and MANET convergence offer the services for cloud access within MANET of devices connected. Objective: The main objective of this research is to establish a cloud-based ad-hoc network architecture for the communication among smart devices under the 5G based Internet of Things architecture. Methods: The methods are applied to discover the smart devices using probability-based model, hidden Markov model and gradient-based model. Results: A cloud-MANET architecture of the smart device is constructed with cloud and MANET computation. The framework allows MANET users to access and deliver cloud services through their connected devices, where all simulations, error handling, and resource management are implemented. Conclusion: The MANET service has been launched as well as linked to the cloud by the mobile device. The author used the amazon cloud storage service. This research produces a conceptual model that is based on the ubiquitous method. It is shown the success in this area and expectations for future scope.

Author(s):  
Tanweer Alam

Background: The wireless networks make it easier for users to connect with each other in the sense of the Internet of Things (IoT) system. The cloud and MANET convergence offer the services for cloud access within MANET of devices connected.Objective: The main objective of this research is to establish a cloud-based ad-hoc network architecture for the communication among smart devices under the 5G based Internet of Things architecture.Methods: The methods are applied to discover the smart devices using probability-based model, hidden Markov model and gradient-based model.Results: A cloud-MANET architecture of the smart device is constructed with cloud and MANET computation. The framework allows MANET users to access and deliver cloud services through their connected devices, where all simulations, error handling, and resource management are implemented.Conclusion: The MANET service has been launched as well as linked to the cloud by the mobile device. The author used the amazon cloud storage service. This research produces a conceptual model that is based on the ubiquitous method. It is shown the success in this area and expectations for future scope.


2020 ◽  
Author(s):  
Tanweer Alam ◽  
Mohamed Benaida

In the next generation of computing, Mobile ad-hoc network (MANET) will play a very important role in the Internet of Things (IoT). The MANET is a kind of wireless networks that are self-organizing and auto connected in a decentralized system. Every device in MANET can be moved freely from one location to another in any direction. They can create a network with their neighbors’ smart devices and forward data to another device. The IoT-Cloud-MANET framework of smart devices is composed of IoT, cloud computing, and MANET. This framework can access and deliver cloud services to the MANET users through their smart devices in the IoT framework where all computations, data handling, and resource management are performed. The smart devices can move from one location to another within the range of the MANET network. Various MANETs can connect to the same cloud, they can use cloud service in a real time. For connecting the smart device of MANET to cloud needs integration with mobile apps. My main contribution in this research links a new methodology for providing secure communication on the internet of smart devices using MANET Concept in 5G. The research methodology uses the correct and efficient simulation of the desired study and can be implemented in a framework of the Internet of Things in 5G.


Author(s):  
Tanweer Alam ◽  
Mohamed Benaida

<p class="0abstract">In the next generation of computing, Mobile ad-hoc network (MANET) will play a very important role in the Internet of Things (IoT).  The MANET is a kind of wireless networks that are self-organizing and auto connected in a decentralized system. Every device in MANET can be moved freely from one location to another in any direction. They can create a network with their neighbors’ smart devices and forward data to another device. The IoT-Cloud-MANET framework of smart devices is composed of IoT, cloud computing, and MANET. This framework can access and deliver cloud services to the MANET users through their smart devices in the IoT framework where all computations, data handling, and resource management are performed. The smart devices can move from one location to another within the range of the MANET network. Various MANETs can connect to the same cloud, they can use cloud service in a real time. For connecting the smart device of MANET to cloud needs integration with mobile apps. My main contribution in this research links a new methodology for providing secure communication on the internet of smart devices using MANET Concept in 5G. The research methodology uses the correct and efficient simulation of the desired study and can be implemented in a framework of the Internet of Things in 5G.</p>


2020 ◽  
Author(s):  
Tanweer Alam ◽  
Mohamed Benaida

In the next generation of computing, Mobile ad-hoc network (MANET) will play a very important role in the Internet of Things (IoT). The MANET is a kind of wireless networks that are self-organizing and auto connected in a decentralized system. Every device in MANET can be moved freely from one location to another in any direction. They can create a network with their neighbors’ smart devices and forward data to another device. The IoT-Cloud-MANET framework of smart devices is composed of IoT, cloud computing, and MANET. This framework can access and deliver cloud services to the MANET users through their smart devices in the IoT framework where all computations, data handling, and resource management are performed. The smart devices can move from one location to another within the range of the MANET network. Various MANETs can connect to the same cloud, they can use cloud service in a real time. For connecting the smart device of MANET to cloud needs integration with mobile apps. My main contribution in this research links a new methodology for providing secure communication on the internet of smart devices using MANET Concept in 5G. The research methodology uses the correct and efficient simulation of the desired study and can be implemented in a framework of the Internet of Things in 5G.


Author(s):  
Donghui Zhang ◽  
Ruijie Liu

Abstract Orienteering has gradually changed from a professional sport to a civilian sport. Especially in recent years, orienteering has been widely popularized. Many colleges and universities in China have also set up this course. With the improvement of people’s living conditions, orienteering has really become a leisure sport in modern people’s life. The reduced difficulty of sports enables more people to participate, but it also exposes a series of problems. As the existing positioning technology is relatively backward, the progress in personnel tracking, emergency services, and other aspects is slow. To solve these problems, a new intelligent orienteering application system is developed based on the Internet of things. ZigBee network architecture is adopted in the system. ZigBee is the mainstream scheme in the current wireless sensor network technology, which has many advantages such as convenient carrying, low power consumption, and signal stability. Due to the complex communication environment in mobile signal, the collected information is processed by signal amplification and signal anti-interference technology. By adding anti-interference devices, video isolators and other devices, the signal is guaranteed to the maximum extent. In order to verify the actual effect of this system, through a number of experimental studies including the relationship between error and traffic radius and the relationship between coverage and the number of anchor nodes, the data shows that the scheme studied in this paper has a greater improvement in comprehensive performance than the traditional scheme, significantly improving the accuracy and coverage. Especially the coverage is close to 100% in the simulation experiment. This research has achieved good results and can be widely used in orienteering training and competition.


Sensors ◽  
2021 ◽  
Vol 21 (9) ◽  
pp. 3257
Author(s):  
Arne Bochem ◽  
Benjamin Leiding

Today, increasing Internet of Things devices are deployed, and the field of applications for decentralized, self-organizing networks keeps growing. The growth also makes these systems more attractive to attackers. Sybil attacks are a common issue, especially in decentralized networks and networks that are deployed in scenarios with irregular or unreliable Internet connectivity. The lack of a central authority that can be contacted at any time allows attackers to introduce arbitrary amounts of nodes into the network and manipulate its behavior according to the attacker’s goals, by posing as a majority participant. Depending on the structure of the network, employing Sybil node detection schemes may be difficult, and low powered Internet of Things devices are usually unable to perform impactful amounts of work for proof-of-work based schemes. In this paper, we present Rechained, a scheme that monetarily disincentivizes the creation of Sybil identities for networks that can operate with intermittent or no Internet connectivity. We introduce a new revocation mechanism for identities, tie them into the concepts of self-sovereign identities, and decentralized identifiers. Case-studies are used to discuss upper- and lower-bounds for the costs of Sybil identities and, therefore, the provided security level. Furthermore, we formalize the protocol using Colored Petri Nets to analyze its correctness and suitability. Proof-of-concept implementations are used to evaluate the performance of our scheme on low powered hardware as it might be found in Internet of Things applications.


2021 ◽  
Vol 39 (4) ◽  
pp. 1-33
Author(s):  
Fulvio Corno ◽  
Luigi De Russis ◽  
Alberto Monge Roffarello

In the Internet of Things era, users are willing to personalize the joint behavior of their connected entities, i.e., smart devices and online service, by means of trigger-action rules such as “IF the entrance Nest security camera detects a movement, THEN blink the Philips Hue lamp in the kitchen.” Unfortunately, the spread of new supported technologies makes the number of possible combinations between triggers and actions continuously growing, thus motivating the need of assisting users in discovering new rules and functionality, e.g., through recommendation techniques. To this end, we present , a semantic Conversational Search and Recommendation (CSR) system able to suggest pertinent IF-THEN rules that can be easily deployed in different contexts starting from an abstract user’s need. By exploiting a conversational agent, the user can communicate her current personalization intention by specifying a set of functionality at a high level, e.g., to decrease the temperature of a room when she left it. Stemming from this input, implements a semantic recommendation process that takes into account ( a ) the current user’s intention , ( b ) the connected entities owned by the user, and ( c ) the user’s long-term preferences revealed by her profile. If not satisfied with the suggestions, then the user can converse with the system to provide further feedback, i.e., a short-term preference , thus allowing to provide refined recommendations that better align with the original intention. We evaluate by running different offline experiments with simulated users and real-world data. First, we test the recommendation process in different configurations, and we show that recommendation accuracy and similarity with target items increase as the interaction between the algorithm and the user proceeds. Then, we compare with other similar baseline recommender systems. Results are promising and demonstrate the effectiveness of in recommending IF-THEN rules that satisfy the current personalization intention of the user.


Author(s):  
Ghazi Hussein Shakah

<span>At the moment, all observed forms of communication are reduced either to a person-to-person scheme or person-to-device. But the Internet of Things (IoT) offers us a tremendous Internet future, in which will appear the communication type machine-machine (M2M). This makes it possible to integrate all communications into a common infrastructure, allowing not only to manage everything that is around us but also providing information about the state of these things. The purpose of this paper is to create the client part of the client-server system for remote control of home appliances using cloud services through commands entered using handwritten words. For this, we develop algorithms and methods for handwriting recognition using neural networks and implement a mobile application on the Android platform, which allows remote control of devices via cloud services based on commands entered using handwritten words. Anyway, this article will give a good understanding to other researchers who want to start their research on the IoT and will contribute to the effective accumulation of knowledge.</span>


Author(s):  
Tanweer Alam

In next-generation computing, the role of cloud, internet and smart devices will be capacious. Nowadays we all are familiar with the word smart. This word is used a number of times in our daily life. The Internet of Things (IoT) will produce remarkable different kinds of information from different resources. It can store big data in the cloud. The fog computing acts as an interface between cloud and IoT. The extension of fog in this framework works on physical things under IoT. The IoT devices are called fog nodes, they can have accessed anywhere within the range of the network. The blockchain is a novel approach to record the transactions in a sequence securely. Developing a new blockchains based middleware framework in the architecture of the Internet of Things is one of the critical issues of wireless networking where resolving such an issue would result in constant growth in the use and popularity of IoT. The proposed research creates a framework for providing the middleware framework in the internet of smart devices network for the internet of things using blockchains technology. Our main contribution links a new study that integrates blockchains to the Internet of things and provides communication security to the internet of smart devices.


2020 ◽  
Author(s):  
Tanweer Alam

<p>The fog computing is the emerging technology to compute, store, control and connecting smart devices with each other using cloud computing. The Internet of Things (IoT) is an architecture of uniquely identified interrelated physical things, these physical things are able to communicate with each other and can transmit and receive information. <a>This research presents a framework of the combination of the Internet of Things (IoT) and Fog computing. The blockchain is also the emerging technology that provides a hyper, distributed, public, authentic ledger to record the transactions. Blockchains technology is a secured technology that can be a boon for the next generation computing. The combination of fog, blockchains, and IoT creates a new opportunity in this area. In this research, the author presents a middleware framework based on the blockchain, fog, and IoT. The framework is implemented and tested. The results are found positive. </a></p>


Sign in / Sign up

Export Citation Format

Share Document