scholarly journals Managing Time-Sensitive IoT Applications via Dynamic Application Task Distribution and Adaptation

2021 ◽  
Vol 13 (20) ◽  
pp. 4148
Author(s):  
Harindu Korala ◽  
Dimitrios Georgakopoulos ◽  
Prem Prakash Jayaraman ◽  
Ali Yavari

The recent proliferation of the Internet of Things has led to the pervasion of networked IoT devices such as sensors, video cameras, mobile phones, and industrial machines. This has fueled the growth of Time-Sensitive IoT (TS-IoT) applications that must complete the tasks of (1) collecting sensor observations they need from appropriate IoT devices and (2) analyzing the data within application-specific time-bounds. If this is not achieved, the value of these applications and the results they produce depreciates. At present, TS-IoT applications are executed in a distributed IoT environment that consists of heterogeneous computing and networking resources. Due to the heterogeneous and volatile nature (e.g., unpredictable data rates and sudden disconnections) of the IoT environment, it has become a major challenge to ensure the time-bounds of TS-IoT applications. Many existing task management techniques (i.e., techniques that are used to manage the execution of IoT applications in distributed computing resources) that have been proposed to support TS-IoT applications to meet their time-bounds do not provide a sophisticated and complete solution to manage the TS-IoT applications in a manner in which their time-bounds are guaranteed. This paper proposes TIDA, a comprehensive platform for managing TS-IoT applications that includes a task management technique, called DTDA, which incorporates novel task sizing, distribution, and dynamic adaptation techniques. DTDA’s task sizing technique measures the computing resources required to complete each task of the TS-IoT application at hand in each available IoT device, edge computer (e.g., network gateways), and cloud virtual machine. DTDA’s task distribution technique distributes and executes the tasks of each TS-IoT application in a manner that their time-bound requirements are met. Finally, DTDA includes a task adaptation technique that dynamically adapts the distribution of tasks (i.e., redistributes TS-IoT application tasks) when it detects a potential application time-bound violation. The paper describes a proof-of-concept implementation of TIDA that uses Microsoft’s Orleans Actor Framework. Finally, the paper demonstrates that the DTDA task management technique of TIDA meets the time-bound requirements of TS-IoT applications by presenting an experimental evaluation involving real time-sensitive IoT applications from the smart city domain.

2021 ◽  
Vol 10 (1) ◽  
pp. 13
Author(s):  
Claudia Campolo ◽  
Giacomo Genovese ◽  
Antonio Iera ◽  
Antonella Molinaro

Several Internet of Things (IoT) applications are booming which rely on advanced artificial intelligence (AI) and, in particular, machine learning (ML) algorithms to assist the users and make decisions on their behalf in a large variety of contexts, such as smart homes, smart cities, smart factories. Although the traditional approach is to deploy such compute-intensive algorithms into the centralized cloud, the recent proliferation of low-cost, AI-powered microcontrollers and consumer devices paves the way for having the intelligence pervasively spread along the cloud-to-things continuum. The take off of such a promising vision may be hurdled by the resource constraints of IoT devices and by the heterogeneity of (mostly proprietary) AI-embedded software and hardware platforms. In this paper, we propose a solution for the AI distributed deployment at the deep edge, which lays its foundation in the IoT virtualization concept. We design a virtualization layer hosted at the network edge that is in charge of the semantic description of AI-embedded IoT devices, and, hence, it can expose as well as augment their cognitive capabilities in order to feed intelligent IoT applications. The proposal has been mainly devised with the twofold aim of (i) relieving the pressure on constrained devices that are solicited by multiple parties interested in accessing their generated data and inference, and (ii) and targeting interoperability among AI-powered platforms. A Proof-of-Concept (PoC) is provided to showcase the viability and advantages of the proposed solution.


Internet of Things(IoT) is playing a pivotal role in our daily life as well as in various fields like Health, agriculture, industries etc. In the go, the data in the various IoT applications will be easily available to the physical dominion and thus the process of ensuringthe security of the data will be a major concern. For the extensive implementation of the numerous applications of IoT , the data security is a critical component. In our work, we have developed an encryption technique to secure the data of IoT. With the help of Merkle-Hellman encryption the data collected from the various IoT devices are first of all encrypted and then the secret message is generated with the help of Elliptic Curve Cryptography.


2021 ◽  
Author(s):  
Dan Ye

Abstract Millimeter-wave technology is rising as a crucial component for 5G radio access and other emerging ancillary wireless networks including Gb/s device-to-device communication and mobile backhaul. This paper envisions that millimeter-wave cognitive radio in 5G network is a proposed smart energy consumption solution of Internet of Things (IoT) devices. Improving resource efficiency and enhancing data rates, resource sharing is a proposed advantage over millimeter wave cognitive radio in 5G IoT network. IoT Fog collaboration is proposed to apply artificial intelligence techniques to offer important energy-saving services allowing integrated systems to perceive, reason, learn, and act intelligently in intelligent gateway control. Smart energy meters are the current energy-saving utility in the flexible deployment of IoT architecture. NarrowBand IoT (NB-IoT) delivers Low Power Wide Area access (LPWA) to a new generation of connected things in the race to 5G IoT network, reducing energy computation and achieving promising network capacity. The renewable energy strategy is a proposed energy-efficiency solution in IoT network, maximizing the power supply while minimizing power consumption. A novel kind of visible light communications (VLC) is proposed to enable mmWave cognitive radio receiver in 5G IoT network. Simulation results show the proposed solution can reap the benefits of higher data rates, more IoT device connectivity, and lower energy consumption.


2021 ◽  
Vol 2021 ◽  
pp. 1-13
Author(s):  
Zakaria Mahlaoui ◽  
Eva Antonino-Daviu ◽  
Miguel Ferrando-Bataller

Based on the characteristic mode theory, a versatile radiation pattern reconfigurable antenna is proposed. The analysis starts from two parallel metallic plates with the same and different dimensions. By means of two PIN diodes, the size of one of the parallel metallic plates can be modified and consequently the behavior of the radiation pattern can be switched between bidirectional and unidirectional radiation patterns. Moreover, a SPDT switch is used to adjust the frequency and match the input impedance. The reconfigurable antenna prototype has been assembled and tested, and a good agreement between simulated and measured results is obtained at 2.5 GHz band which fits the IoT applications.


Author(s):  
Jose Marcos C. Brito

The fifth generation of mobile communications networks (5G) is currently in the standardization process, which is expected to be completed in 2020. For this new generation, new applications and scenarios are imposing new performance requirements in addition to higher data rates. Specifically, the Internet of Things (IoT) and e-health applications have very important economic roles in 5G networks and define particular performance requirements that must be considered when defining the technologies for 5G networks. In this paper, the author discusses the influence of e-health and IoT applications on the technological trends for 5G networks.


2019 ◽  
Vol 2019 ◽  
pp. 1-19 ◽  
Author(s):  
Zeeshan Ali Khan ◽  
Peter Herrmann

Many Internet of Things (IoT) systems run on tiny connected devices that have to deal with severe processor and energy restrictions. Often, the limited processing resources do not allow the use of standard security mechanisms on the nodes, making IoT applications quite vulnerable to different types of attacks. This holds particularly for intrusion detection systems (IDS) that are usually too resource-heavy to be handled by small IoT devices. Thus, many IoT systems are not sufficiently protected against typical network attacks like Denial-of-Service (DoS) and routing attacks. On the other side, IDSs have already been successfully used in adjacent network types like Mobile Ad hoc Networks (MANET), Wireless Sensor Networks (WSN), and Cyber-Physical Systems (CPS) which, in part, face limitations similar to those of IoT applications. Moreover, there is research work ongoing that promises IDSs that may better fit to the limitations of IoT devices. In this article, we will give an overview about IDSs suited for IoT networks. Besides looking on approaches developed particularly for IoT, we introduce also work for the three similar network types mentioned above and discuss if they are also suitable for IoT systems. In addition, we present some suggestions for future research work that could be useful to make IoT networks more secure.


Author(s):  
Mamata Rath ◽  
Bibudhendu Pati

Adoption of Internet of Things (IoT) and Cloud of Things (CoT) in the current developing technology era are expected to be more and more invasive, making them important mechanism of the future Internet-based communication systems. Cloud of Things and Internet of Things (IoT) are two emerging as well as diversified advanced domains that are diversified in current technological scenario. Paradigm where Cloud and IoT are merged together is foreseen as disruptive and as an enabler of a large number of application scenarios. Due to the adoption of the Cloud and IoT paradigm a number of applications are gaining important technical attention. In the future, it is going to be more complicated a setup to handle security in technology. Information till now will severely get changed and it will be very tough to keep up with varying technology. Organisations will have to repeatedly switch over to new skill-based technology with respect to higher expenditure. Latest tools, methods and enough expertise are highly essential to control threats and vulnerability to computing systems. Keeping in view the integration of Cloud computing and IoT in the new domain of Cloud of things, the said article provides an up-to-date eminence of Cloud-based IoT applications and Cloud of Things with a focus on their security and application-oriented challenges. These challenges are then synthesized in detail to present a technical survey on various issues related to IoT security, concerns, adopted mechanisms and their positive security assurance using Cloud of Things.


Electronics ◽  
2020 ◽  
Vol 9 (11) ◽  
pp. 1925
Author(s):  
Soe Ye Yint Tun ◽  
Samaneh Madanian ◽  
Dave Parry

The elderly population is increasing globally, putting more pressure on aged care and public health systems. To address this issue and help increase the independence of older people, different digital technologies, including the Internet of things (IoT), can play an important role. Although there has been an increase in the number of studies in this field, most of them concentrate on IoT applications in elderly care from a technology perspective, with very little contribution from the clinical side. Therefore, this paper aims to investigate and identify the available IoT applications and their clinical utility for common diseases in elderly people. The results of this study could be useful for information technology professionals in developing and understanding the clinical requirements for IoT applications in healthcare for older people. Clinicians will also be informed about the clinical possibilities of using IoT devices in this area. Based on our findings, future research should focus on enhancing the clinical utility of current IoT applications in different settings and on developing new applications to support practitioners and older people.


2020 ◽  
Vol 2020 ◽  
pp. 1-11
Author(s):  
Wanli Zhang ◽  
Xianwei Li ◽  
Liang Zhao ◽  
Xiaoying Yang

Network performance is of great importance for processing Internet of Things (IoT) applications in the fifth-generation (5G) communication system. With the increasing number of the devices, how network services should be provided with better performances is becoming a pressing issue. The static resource allocation of wireless networks is becoming a bottleneck for the emerging IoT applications. As a potential solution, network virtualization is considered a promising approach to enhancing the network performance and solving the bottleneck issue. In this paper, the problem of wireless network virtualization is investigated where one wireless infrastructure provider (WIP), mobile virtual network operators (MVNOs), and IoT devices coexist. In the system model under consideration, with the help of a software-defined network (SDN) controller, the WIP can divide and reconfigure its radio frequency bands to radio frequency slices. Then, two MVNOs, MVNO1 and MVNO2, can lease these frequency slices from the WIP and then provide IoT network services to IoT users under competition. We apply a two-stage Stackelberg game to investigate and analyze the relationship between the two MVNOs and IoT users, where MVNO1 and MVNO2 firstly try to maximize their profits by setting the optimal network service prices. Then, IoT users make decisions on which network service they should select according to the performances and prices of network services. Two competition cases between MVNO1 and MVNO2 are considered, namely, Stackelberg game (SG) where MVNO1 is the leader whose price of network service is set firstly and MVNO2 is the follower whose network service price is set later and noncooperative strategic game (NSG) under which the service prices of MVNO1 and MVNO2 are simultaneously set. Each IoT user decides whether and which MVNO to select on the basis of the network service prices and qualities. The numerical results are provided to show the effectiveness of our game model and the proposed solution method.


Author(s):  
Jose Marcos C. Brito

The fifth generation of mobile communications networks (5G) is currently in the standardization process, which is expected to be completed in 2020. For this new generation, new applications and scenarios are imposing new performance requirements in addition to higher data rates. Specifically, the Internet of Things (IoT) and e-health applications have very important economic roles in 5G networks and define particular performance requirements that must be considered when defining the technologies for 5G networks. In this paper, the author discusses the influence of e-health and IoT applications on the technological trends for 5G networks.


Sign in / Sign up

Export Citation Format

Share Document