scholarly journals Cloud Based IoT Network Virtualization for Supporting Dynamic Connectivity among Connected Devices

Electronics ◽  
2019 ◽  
Vol 8 (7) ◽  
pp. 742 ◽  
Author(s):  
Israr Ullah ◽  
Shakeel Ahmad ◽  
Faisal Mehmood ◽  
DoHyeun Kim

Internet of Things (IoT) is considered one of the future disruptive technologies and has attracted lots of research attention in the recent past. IoT devices are tiny sensing or actuating devices attached to daily life objects, capable of sending sensing data and receiving commands. Cloud computing technology provides tremendous computing and storage capacity over the Internet to overcome limited resources of IoT devices. Many studies are conducted on IoT device virtualization in the cloud environment to facilitate remote access and control. In the future, IoT devices will be accessed through its corresponding virtual objects. Just like the network of physical devices, there needs to be a network of virtual objects in the cyber world. In this paper, we present a concept of building a dynamic virtual network in the cloud environment among connected IoT devices. The key idea is to provide a mechanism for building a virtual network among connected IoT devices from different domains through their corresponding virtual objects in the cloud environment. This will facilitate the sharing of resources and the rapid development of diverse applications on top of the virtualization layer by establishing a dynamic end-to-end connection between IoT devices. In this study, we present a detailed design of the proposed system for building a virtual IoT network. We have also implemented three application layers protocols in OMNET++ for simulation of a virtual objects network to conduct performance analysis of the proposed IoT network virtualization.

Electronics ◽  
2020 ◽  
Vol 9 (4) ◽  
pp. 604
Author(s):  
Faisal Mehmood ◽  
Israr Ullah ◽  
Shabir Ahmad ◽  
Do-Hyeun Kim

The Internet of Things refers (IoT) to the billions of physical devices around the globe that are connected to the Internet, collecting and sharing data. The overall Internet of Things market is projected to be worth more than 50.6 billion U.S. dollars in 2020. IoT devices possess low processing capabilities, limited memory, limited storage, and minimal network protocol support. With the help of cloud computing technology, we can overcome the limited resources of IoT devices. A lot of research has been conducted on IoT device virtualization to facilitate remote access and control. The concept of virtualization in IoT is to provide a virtual representation of physical devices in the form of virtual objects. IoT devices are more likely to be accessed and communicate through virtual objects in the near future. In this paper, we present the design and implementation of building a virtual IoT network for a smart home. The virtual network is based on virtual objects and IoT controller. We derived the concept from Software Defined Network (SDN) and separated the control plane and data plane in the virtual IoT network. This enhanced the rapid development of diverse applications on top of the virtualization layer by establishing a dynamic end-to-end connection between IoT devices. This article briefly explains the design and development of the virtual network. Results achieved during experiments and performance analysis show that IoT controller enhances the capabilities of a virtual network by dynamically controlling the traffic congestion, handling mapping requests, and routing mechanisms.


2019 ◽  
Vol 8 (4) ◽  
pp. 12056-12059

The Inclination of world towards Internet of Things (IOT) is the future of each biotic and abiotic things in world. As the IOT will transform into enormous networks of connected devices transmitting data of their functioning with the help of internet, artificial intelligence & data sensor to transform them into intelligent virtual objects. The aim of IOT is to provide more comfortable & efficient life the consumer, by gathering operational behaviour of an object to track down its effect. In sneak peak of this, present study portrays the future opportunity of IOT concept by systematic research paper of scholar & the five popular IOT devices launched in world and their functioning.


1970 ◽  
Vol 3 (7) ◽  
pp. 211-214 ◽  

The role of Members of the Institute and the Institute's place in the future environment that will emerge in the next few years is discussed, with particular emphasis upon the contribution that the Institute and its Members can make to the strength of this emerging future through our particular activities and capabilities.


2021 ◽  
Vol 11 (1) ◽  
Author(s):  
Huoyin Zhang ◽  
Shiyunmeng Zhang ◽  
Jiachen Lu ◽  
Yi Lei ◽  
Hong Li

AbstractPrevious studies in humans have shown that brain regions activating social exclusion overlap with those related to attention. However, in the context of social exclusion, how does behavioral monitoring affect individual behavior? In this study, we used the Cyberball game to induce the social exclusion effect in a group of participants. To explore the influence of social exclusion on the attention network, we administered the Attention Network Test (ANT) and compared results for the three subsystems of the attention network (orienting, alerting, and executive control) between exclusion (N = 60) and inclusion (N = 60) groups. Compared with the inclusion group, the exclusion group showed shorter overall response time and better executive control performance, but no significant differences in orienting or alerting. The excluded individuals showed a stronger ability to detect and control conflicts. It appears that social exclusion does not always exert a negative influence on individuals. In future research, attention to network can be used as indicators of social exclusion. This may further reveal how social exclusion affects individuals' psychosomatic mechanisms.


Sensors ◽  
2021 ◽  
Vol 21 (10) ◽  
pp. 3515
Author(s):  
Sung-Ho Sim ◽  
Yoon-Su Jeong

As the development of IoT technologies has progressed rapidly recently, most IoT data are focused on monitoring and control to process IoT data, but the cost of collecting and linking various IoT data increases, requiring the ability to proactively integrate and analyze collected IoT data so that cloud servers (data centers) can process smartly. In this paper, we propose a blockchain-based IoT big data integrity verification technique to ensure the safety of the Third Party Auditor (TPA), which has a role in auditing the integrity of AIoT data. The proposed technique aims to minimize IoT information loss by multiple blockchain groupings of information and signature keys from IoT devices. The proposed technique allows IoT information to be effectively guaranteed the integrity of AIoT data by linking hash values designated as arbitrary, constant-size blocks with previous blocks in hierarchical chains. The proposed technique performs synchronization using location information between the central server and IoT devices to manage the cost of the integrity of IoT information at low cost. In order to easily control a large number of locations of IoT devices, we perform cross-distributed and blockchain linkage processing under constant rules to improve the load and throughput generated by IoT devices.


Author(s):  
Sandra L. Neate ◽  
Keryn L. Taylor ◽  
Nupur Nag ◽  
George A. Jelinek ◽  
Steve Simpson-Yap ◽  
...  

People with multiple sclerosis (PwMS) often experience uncertainty and fear about their futures. Partners of PwMS may share their concerns and experience fears about their own futures, limitations on their lives, ability to work, and becoming a carer. For PwMS, modification of lifestyle-related risk factors has been associated with improved health outcomes. For PwMS who attended residential lifestyle modification workshops (RLMW), sustained improved health outcomes have been demonstrated. Whether improved outcomes for PwMS who engage with lifestyle modification translate to improved partner perceptions of the future, is yet to be explored. We explored the perspectives of partners of PwMS who had attended a RLMW and the impact that the person with MS’s illness and their engagement with lifestyle modification had on their partners’ views of the future. Analysis of 21 semi-structured interviews used a methodology informed by Heidegger’s Interpretive Phenomenology. Three themes emerged: ‘uncertainty’, ‘planning for the future’ and ‘control, empowerment and confidence’. Subthemes included MS and lifestyle modification being a catalyst for positive change; developing a sense of control and empowerment; and hope, optimism and positivity. Lifestyle modification may provide benefits, not only to PwMS, but also to their partners, and should be considered part of mainstream management of MS.


2021 ◽  
Vol 54 (4) ◽  
pp. 1-36
Author(s):  
Fei Chen ◽  
Duming Luo ◽  
Tao Xiang ◽  
Ping Chen ◽  
Junfeng Fan ◽  
...  

Recent years have seen the rapid development and integration of the Internet of Things (IoT) and cloud computing. The market is providing various consumer-oriented smart IoT devices; the mainstream cloud service providers are building their software stacks to support IoT services. With this emerging trend even growing, the security of such smart IoT cloud systems has drawn much research attention in recent years. To better understand the emerging consumer-oriented smart IoT cloud systems for practical engineers and new researchers, this article presents a review of the most recent research efforts on existing, real, already deployed consumer-oriented IoT cloud applications in the past five years using typical case studies. Specifically, we first present a general model for the IoT cloud ecosystem. Then, using the model, we review and summarize recent, representative research works on emerging smart IoT cloud system security using 10 detailed case studies, with the aim that the case studies together provide insights into the insecurity of current emerging IoT cloud systems. We further present a systematic approach to conduct a security analysis for IoT cloud systems. Based on the proposed security analysis approach, we review and suggest potential security risk mitigation methods to protect IoT cloud systems. We also discuss future research challenges for the IoT cloud security area.


2021 ◽  
pp. 053901842199956
Author(s):  
Gerard Delanty

This essay is a comment on the research program launched by Frank Adloff and Sighard Neckel. My comment is specifically focused on their research agenda as outlined in their trend-setting article, ‘Futures of sustainability as modernization, transformation, and control: A conceptual framework’. The comment is also addressed more generally to the research program of the Humanities Centre for Advanced Studies ‘Futures of Sustainability’. I raise three issues: the first relates to the very idea of the future; the second concerns the notion of social imaginaries and the third question is focused on the idea of social transformation.


2012 ◽  
Vol 433-440 ◽  
pp. 7024-7028
Author(s):  
Hui Fu ◽  
Bin Jin ◽  
Lin Han ◽  
Zuo Tang Tao

With computer technology, communication technology and the rapid development of electronic technology, remote monitoring technology will be more widely used for data transmission requirements and more stringent. GPRS-based remote monitoring system, which is based in communications equipment, through the server to PC, as the remote control platform, embedded applications, network programming and other technology, the remote information display and control. Throughout the system, users can allow each terminal in the case of permission to accept the data on the changes and settings. Wireless network communication is important that the network transmission of data security and consistency, to solve this problem this thesis, performance of network communications software technology to achieve self-monitoring and self-recovery, while use of end to end encryption to encrypt data on the transmission , which can guarantee data reliability, completeness, real time and security.


2017 ◽  
Vol 76 (5) ◽  
pp. 1225-1233 ◽  
Author(s):  
M. Schäfer ◽  
I. Hobus ◽  
T. G. Schmitt

In the future, an additional potential of control reserve as well as storage capacities will be required to compensate fluctuating renewable energy availability. The operation of energy systems will change and flexibility in energy generation and consumption will rise to a valuable asset. Wastewater treatment plants (WWTPs) are capable of providing the flexibility needed, not only with their energy generators but also in terms of their energy consuming aggregates on the plant. To meet challenges of the future in regard to energy purchase and to participate in and contribute to such a volatile energy market, WWTPs have to reveal their energetic potential as a flexible service provider. Based on the evaluated literature and a detailed analysis of aggregates on a pilot WWTP an aggregate management has been developed to shift loads and provide a procedure to identify usable aggregates, characteristic values and control parameters to ensure effluent quality. The results show that WWTPs have a significant potential to provide energetic flexibility. Even for vulnerable components such as aeration systems, load-shifting is possible with appropriate control parameters and reasonable time slots without endangering system functionality.


Sign in / Sign up

Export Citation Format

Share Document