scholarly journals Resource Management Based on OCF for Device Self-Registration and Status Detection in IoT Networks

Electronics ◽  
2019 ◽  
Vol 8 (3) ◽  
pp. 311 ◽  
Author(s):  
Wenquan Jin ◽  
Dohyeun Kim

Recently, there are heterogeneous devices that connect to the Internet to provide ubiquitous and intelligent services based on sensors and actuators in the network of the Internet of Things (IoT). The resources of IoT represent the physical entities on the Internet to expose functions through services. Resource management is necessary to enable a massive amount of IoT-connected devices to be discoverable and accessible in the network of IoT. In this paper, we propose an IoT resource management to provide schemes of device self-registration and status detection for devices based on the Open Connectivity Foundation (OCF) standard. This device self-registration scheme is based on an agent that is proposed for registering devices itself which deployed in the OCF network. The devices host the OCF resources to provide IoT services such as sensing and controlling through the sensors and actuators. For a group of devices, an agent-based self-registration is proposed to register the resources. Through the proposed self-registration, the information of IoT devices is published using profile and saved in the management platform that enables the clients to discover the resources and access the services. For accessing the IoT resources in the OCF network, an interworking proxy is proposed to support the communications between web clients and devices over Hypertext Transfer Protocol (HTTP) and Constrained Application Protocol (CoAP) based on OCF. Furthermore, through the interoperability of the resources using the registered information, a real-time monitoring scheme is proposed based on periodic request and response for the status detection of deployed devices.

Sensors ◽  
2020 ◽  
Vol 20 (15) ◽  
pp. 4341
Author(s):  
Alejandro Pozo ◽  
Álvaro Alonso ◽  
Joaquín Salvachúa

The Internet of Things (IoT) brings plenty of opportunities to enhance society’s activities, from improving a factory’s production chain to facilitating people’s household tasks. However, it has also brought new security breaches, compromising privacy and authenticity. IoT devices are vulnerable to being accessed from the Internet; they lack sufficient resources to face cyber-attack threats. Keeping a balance between access control and the devices’ resource consumption has become one of the highest priorities of IoT research. In this paper, we evaluate an access control architecture based on the IAACaaS (IoT application-Scoped Access Control as a Service) model with the aim of protecting IoT devices that communicate using the Publish/Subscribe pattern. IAACaaS is based on the OAuth 2.0 authorization framework, which externalizes the identity and access control infrastructure of applications. In our evaluation, we implement the model using FIWARE Generic Enablers and deploy them for a smart buildings use case with a wireless communication. Then, we compare the performance of two different approaches in the data-sharing between sensors and the Publish/Subscribe broker, using Constrained Application Protocol (CoAP) and Hypertext Transfer Protocol (HTTP) protocols. We conclude that the integration of Publish/Subscribe IoT deployments with IAACaaS adds an extra layer of security and access control without compromising the system’s performance.


2021 ◽  
pp. 218-228
Author(s):  
Kieron O’Hara

The Internet of Things is created by giving Internet connections to objects embedded in the environment, including wearable items. When IoT devices are connected and coordinated in an urban environment, smart cities are created, which can allow control of the environment, for example to improve carbon emissions or traffic flow. Instrumentation of the environment creates problems of consent, privacy, security, safety, and trust. The status of the IoT with respect to Internet ideology is discussed. The Silicon Valley Open Internet supports citizen-centric development, but may lack coordination at scale. The DC Commercial Internet creates great power for platforms. The Brussels Bourgeois Internet values rights and privacy, which may suppress innovation. In China, India, and elsewhere, smart cities are seen as key to developing a paternal social vision under digital modernity. Given its key role in the IoT, this is where America’s battle against Huawei may be most consequential.


2019 ◽  
Vol 29 (11n12) ◽  
pp. 1703-1725
Author(s):  
Carlos Eduardo Pantoja ◽  
Heder Dorneles Soares ◽  
José Viterbo ◽  
Tielle Alexandre ◽  
Amal El-Fallah Seghrouchni ◽  
...  

This paper proposes an architecture for sharing IoT Objects’ resources in the Internet of Things providing a model for its owners to expose devices, which can be consumed by clients inspired by the Sensor-as-a-Service model. The main idea relies on the fact that users, such as developers and researchers, do not always have access to the necessary hardware and resources. Exposing devices in IoT should impact these persons activities. Then, we present the Resource Management Architecture, where several IoT Objects endowed with sensors and actuators can be added to environments that are represented virtually in the architecture. The IoT Objects become available to be consumed by users through the use of applications. The architecture is composed of three layers: one representing devices, the cloud solution, and applications, and how they interact with each other. We also present a study case for testing the whole approach in a smart city scenario.


Author(s):  
Víctor H. Benítez ◽  
◽  
Gustavo C. Soto ◽  
Luis C. Félix-Herrán ◽  
Jesús Pacheco

Nowadays, the Internet of Things is used to transfer information from human to human and from human to machine. In this paper, we propose the use of IoT platforms to link those homes that are equipped with IoT capabilities, in order to increase security and prevent from a crime to a fire, and even monitor health status of a person. Using a microcontroller, it is possible to send information to a cloud server capable of sharing this information with other households connected to the platform, as well as allowing linking this data to one of the most used social networks in the world: Facebook. Linking smart homes with social network, allows to consult the status of sensors and IoT devices empowering citizen security against crime, violence and events that could put the integrity of people at risk both in their property and their health. The study is carried out for a particular region of Latin America, given its high rates of violence against citizens that have occurred in recent years.


2020 ◽  
Author(s):  
◽  
Fahed Alkhabbas

The Internet of Things (IoT) is a fast-spreading technology that enables new types of services in several domains such as transportation, health, and building automation. To exploit the potential of the IoT effectively, several challenges have to be tackled, including the following ones that we study in this thesis. First, the proposed IoT visions provide a fragmented picture, leading to a lack of consensus about IoT systems and their constituents. To piece together the fragmented picture of IoT systems, we systematically identified their characteristics by analyzing existing taxonomies. More specifically, we identified seventeen characteristics of IoT systems, and grouped them into two categories, namely, elements and quality aspects of IoT systems. Moreover, we conducted a survey to identify the factors that drive the deployment decisions of IoT systems in practice. A second set of challenges concerns the environment of IoT systems that is often dynamic and uncertain. For instance, due to the mobility of users and things, the set of things available in users' environment might change suddenly. Similarly, the status of IoT systems’ deployment topologies (i.e., the deployment nodes and their interconnections) might change abruptly. Moreover, environmental conditions monitored and controlled through IoT devices, such as ambient temperature and oxygen levels, might fluctuate suddenly. The majority of existing approaches to engineer IoT systems rely on predefined processes to achieve users’ goals. Consequently, such systems have significant shortcomings in coping with dynamic and uncertain environments. To address these challenges, we used the concept of Emergent Configurations (ECs) to engineer goal-driven IoT systems. An EC is an IoT system that consists of a dynamic set of things that cooperate temporarily to achieve a user goal. To realize ECs, we proposed an abstract architectural approach, comprising an architecture and processes, as well as six novel approaches that refine the abstract approach. The developed approaches support users to achieve their goals seamlessly in arbitrary environments by enabling the dynamic formation, deployment, enactment, and self-adaptation of IoT systems. The approaches exploit different techniques and focus on different aspects of ECs. Moreover, to better support users in dynamic and uncertain environments, we investigated the automated configuration of those environments based on users' preferences.


2021 ◽  
Vol 309 ◽  
pp. 01209
Author(s):  
Manisha Gunturi

The new technology and concepts of IoT is gaining a lot of interest in the recent years. This technology aims at improving the\ quality and productivity in various domains. The Internet of Things (IoT) is about the use of sensors and smart devices and to utilize data collected by these embedded sensors and actuators for automation. The technology has proven its significance in many domains and is successfully being used in the various fields of civil engineering. The application of the IoT is paving its way towards smart and sustainable infrastructure. This paper proposes to contemplate the status of usage of IoT in Civil Engineering, its issues and difficulties.


2021 ◽  
Vol XXIV (1) ◽  
pp. 111-116
Author(s):  
BÎRLEANU S.

The Internet of Things (IoT) is a network of physical objects that contain electronics embedded in their architecture to communicate and feel the interactions between them or with the external environment. In the coming years, IoT-based technology will provide advanced levels of service and will virtually change the way people live their daily lives. Advances in medicine, engineering, business, agriculture, smart cities and smart homes are just some of the categorical examples in which the IoT is strongly established. In other words, IoT is the connection of any device (from mobile phones, vehicles, appliances and other embedded elements with sensors and actuators) to the Internet, so that these objects can exchange data with each other in a network. It is interesting to note that the difference between IoT and the Internet is the absence of human role.


2021 ◽  
Vol 8 (2) ◽  
pp. 205395172110519
Author(s):  
Sungyong Ahn

It is now a common belief that the truths of our lives are hidden in the databases streamed from our interactions in smart environments. In this current hype of big data, the Internet of Things has been suggested as the idea to embed small sensors and actuators everywhere to unfold the truths beneath the surfaces of everything. However, remaining the technology that promises more than it can provide thus far, more important for the IoT’s actual expansion to various social domains than the actual discovery of hidden truths has been people’s speculations about the unknown problems, such as hidden security issues or lifestyle concerns, beyond the narrow human knowability but assumed to leave their traces in the IoT-collected big data. This paper discuss this speculation as the concealed cognitive labor of IoT users that projects some fictitious values to the big data IoT companies accumulate. By the term pan-kinetics, the systemic operation of smart actuators is analyzed as the process through which fictitious values of data are converted to the real values as these actuators draw some profitable correlations from physical domains of the IoT. Analyzing smart electroencephalogram (EEG) headsets as the unique IoT devices operating on human brains, it argues how the IoT translates this speculative realism of unknown problems into its big data, which the IoT developers believe to be full of machine-learnable correlations that would lead to the smart solutions of the problems.


2022 ◽  
Vol 54 (7) ◽  
pp. 1-34
Author(s):  
Sophie Dramé-Maigné ◽  
Maryline Laurent ◽  
Laurent Castillo ◽  
Hervé Ganem

The Internet of Things is taking hold in our everyday life. Regrettably, the security of IoT devices is often being overlooked. Among the vast array of security issues plaguing the emerging IoT, we decide to focus on access control, as privacy, trust, and other security properties cannot be achieved without controlled access. This article classifies IoT access control solutions from the literature according to their architecture (e.g., centralized, hierarchical, federated, distributed) and examines the suitability of each one for access control purposes. Our analysis concludes that important properties such as auditability and revocation are missing from many proposals while hierarchical and federated architectures are neglected by the community. Finally, we provide an architecture-based taxonomy and future research directions: a focus on hybrid architectures, usability, flexibility, privacy, and revocation schemes in serverless authorization.


Sign in / Sign up

Export Citation Format

Share Document