scholarly journals Management Platforms and Protocols for Internet of Things: A Survey

Sensors ◽  
2019 ◽  
Vol 19 (3) ◽  
pp. 676 ◽  
Author(s):  
Jonathan Silva ◽  
Joel Rodrigues ◽  
Jalal Al-Muhtadi ◽  
Ricardo Rabêlo ◽  
Vasco Furtado

Internet of Things (IoT) management systems require scalability, standardized communication, and context-awareness to achieve the management of connected devices with security and accuracy in real environments. Interoperability and heterogeneity between hardware and application layers are also critical issues. To attend to the network requirements and different functionalities, a dynamic and context-sensitive configuration management system is required. Thus, reference architectures (RAs) represent a basic architecture and the definition of key characteristics for the construction of IoT environments. Therefore, choosing the best technologies of the IoT management platforms and protocols through comparison and evaluation is a hard task, since they are difficult to compare due to their lack of standardization. However, in the literature, there are no management platforms focused on addressing all IoT issues. For this purpose, this paper surveys the available policies and solutions for IoT Network Management and devices. Among the available technologies, an evaluation was performed using features such as heterogeneity, scalability, supported technologies, and security. Based on this evaluation, the most promising technologies were chosen for a detailed performance evaluation study (through simulation and deployment in real environments). In terms of contributions, these protocols and platforms were studied in detail, the main features of each approach are highlighted and discussed, open research issues are identified as well as the lessons learned on the topic.

2020 ◽  
Vol 16 (4) ◽  
pp. 155014772090877 ◽  
Author(s):  
Juyeon Son ◽  
Wonyoung Choi ◽  
Sang-Min Choi

Social Internet of things is one of the most up-to-date research issues in the applications of Internet of things technologies. In social Internet of things, accuracy and reliability are standard features to discerning decisions. We assume that decision support systems based on social Internet of things could leverage research from recommender systems to achieve more stable performance. Therefore, we propose a trust-aware recommender systems suitable for social Internet of things. Trust-aware recommender systems adapt the concept of social networking service and utilize social interaction information. Trust information not only improves recommender systems from opinion spam problems but also more accurately predicts users’ preferences. We confirm that the performance of a recommender system becomes more improved when implicit trust is able to satisfy the properties of trust in the social Internet of things environment. The structure and amount of social link information are context-sensitive, so applying the concept of trust into social Internet of things environments requires a method to optimize implicit and explicit trust with minimal social link information. Our proposed method configures an asymmetric implicit trust network utilizing user–item rating matrix and transforms trust propagation metrics for a directional and weighted trust network. Through experiments, we confirm that the proposed methods enable higher accuracy and wider coverage compared to the existing recommendation methods.


2019 ◽  
Vol 3 (2) ◽  
pp. 14-21
Author(s):  
Majed Alhaisoni

The Internet of Things is the current and next revolution in integrating various technologies and wireless communications. It has been shown to make an important contribution in various modes of communication, in homes, offices and other buildings. However, certain research issues are still remain, such as life span of the network and a definition of the most influential nodes in communications, which affect the overall energy distribution. This paper introduces a new approach to enhance the communication over the internet of things, by combining two different domains, the computer network and network science. Various scenarios have been thoroughly implemented and tested over different network topologies. The results show clear enhancements on network centrality and overall energy distribution.


Sensors ◽  
2020 ◽  
Vol 20 (9) ◽  
pp. 2464 ◽  
Author(s):  
A. S. M. Kayes ◽  
Rudri Kalaria ◽  
Iqbal H. Sarker ◽  
Md. Saiful Islam ◽  
Paul A. Watters ◽  
...  

Over the last few decades, the proliferation of the Internet of Things (IoT) has produced an overwhelming flow of data and services, which has shifted the access control paradigm from a fixed desktop environment to dynamic cloud environments. Fog computing is associated with a new access control paradigm to reduce the overhead costs by moving the execution of application logic from the centre of the cloud data sources to the periphery of the IoT-oriented sensor networks. Indeed, accessing information and data resources from a variety of IoT sources has been plagued with inherent problems such as data heterogeneity, privacy, security and computational overheads. This paper presents an extensive survey of security, privacy and access control research, while highlighting several specific concerns in a wide range of contextual conditions (e.g., spatial, temporal and environmental contexts) which are gaining a lot of momentum in the area of industrial sensor and cloud networks. We present different taxonomies, such as contextual conditions and authorization models, based on the key issues in this area and discuss the existing context-sensitive access control approaches to tackle the aforementioned issues. With the aim of reducing administrative and computational overheads in the IoT sensor networks, we propose a new generation of Fog-Based Context-Aware Access Control (FB-CAAC) framework, combining the benefits of the cloud, IoT and context-aware computing; and ensuring proper access control and security at the edge of the end-devices. Our goal is not only to control context-sensitive access to data resources in the cloud, but also to move the execution of an application logic from the cloud-level to an intermediary-level where necessary, through adding computational nodes at the edge of the IoT sensor network. A discussion of some open research issues pertaining to context-sensitive access control to data resources is provided, including several real-world case studies. We conclude the paper with an in-depth analysis of the research challenges that have not been adequately addressed in the literature and highlight directions for future work that has not been well aligned with currently available research.


2010 ◽  
Vol 2010 ◽  
pp. 1-18 ◽  
Author(s):  
Yasser L. Morgan

The Dedicated Short-Range Communications (DSRC) standards suite is based on multiple cooperating standards mainly developed by the IEEE. In particular, we focus this paper on the core design aspects of DSRC which is called Wireless Access in Vehicular Environment (WAVE). WAVE is highlighted in IEEE 1609.1/.2/.3/.4. The DSRC and WAVE standards have been the center of major attention in both research and industrial communities. In 2008, WAVE standard was the third best seller standards in the history of the IEEE. This attention reflects the potential of WAVE to facilitate much of the vehicular safety applications. In this paper we present a fairly detailed tutorial of the WAVE standards. We extend the paper by describing some of the lessons learned from particular design approaches. We direct the reader to the landmark research papers in relevant topics. We alert the reader about major open research issues that might lead to future contribution to the WAVE design.


2020 ◽  
Author(s):  
Abhishek Verma ◽  
Virender Ranga

<div>Internet of Things (IoT) is one of the fastest emerging networking paradigms enabling a large number of applications for the benefit of mankind. Advancements in embedded system technology and compressed IPv6 have enabled the support of IP stack in resource constrained heterogeneous smart devices. However, global connectivity and resource constrained characteristics of smart devices have exposed them to different insider and outsider attacks, which put users’ security and privacy at risk. Various risks associated with IoT slow down its growth and become an obstruction in the worldwide adoption of its applications. In RFC 6550, the IPv6 Routing Protocol for Low Power and Lossy Network (RPL) is specified by IETF’s ROLL working group for facilitating efficient routing in 6LoWPAN networks, while considering its limitations. Due to resource constrained nature of nodes in the IoT, RPL is vulnerable to many attacks that consume the node’s resources and degrade the network’s performance. In this paper, we present a study on</div><div>various attacks and their existing defense solutions, particularly to RPL. Open research issues, challenges, and future directions specific to RPL security are also discussed. A taxonomy of RPL attacks, considering the essential attributes like resources, topology, and traffic, is shown for better understanding. In addition, a study of existing cross-layered and RPL specific network layer based defense solutions suggested in the literature is also carried out.</div>


Author(s):  
Sandhya M.K ◽  
Sathya Priya S ◽  
Prasidh S

: Obstructive Sleep Apnea is a kind of sleep syndrome, which has an adverse effect on both the health, and quality of life of an individual. It results in severe health problems like hypertension, stroke and many cardiovascular issues. Only a very less percentage of persons with Obstructive Sleep Apnea are diagnosed and treated. This is due to the lack of available devices and technology. Detection of this sleep disorder is extremely important, as the negligence can prove fatal. Hence, the critical need in healthcare is the instantaneous monitoring of this disorder. The current approaches for detecting this disorder are very expensive, bulky and intrusive which in turn will affect the sleep quality of patients. So there is a necessity to design less expensive, light-weight non-intrusive systems to diagnose these sleep-related issues. In this paper, the various non-invasive schemes using sensors and Internet-of-Things to detect Obstructive Sleep Apnea are reviewed. Further, the open research issues and challenges in detecting Obstructive Sleep Apnea are presented.


2020 ◽  
Author(s):  
Abhishek Verma ◽  
Virender Ranga

<div>Internet of Things (IoT) is one of the fastest emerging networking paradigms enabling a large number of applications for the benefit of mankind. Advancements in embedded system technology and compressed IPv6 have enabled the support of IP stack in resource constrained heterogeneous smart devices. However, global connectivity and resource constrained characteristics of smart devices have exposed them to different insider and outsider attacks, which put users’ security and privacy at risk. Various risks associated with IoT slow down its growth and become an obstruction in the worldwide adoption of its applications. In RFC 6550, the IPv6 Routing Protocol for Low Power and Lossy Network (RPL) is specified by IETF’s ROLL working group for facilitating efficient routing in 6LoWPAN networks, while considering its limitations. Due to resource constrained nature of nodes in the IoT, RPL is vulnerable to many attacks that consume the node’s resources and degrade the network’s performance. In this paper, we present a study on</div><div>various attacks and their existing defense solutions, particularly to RPL. Open research issues, challenges, and future directions specific to RPL security are also discussed. A taxonomy of RPL attacks, considering the essential attributes like resources, topology, and traffic, is shown for better understanding. In addition, a study of existing cross-layered and RPL specific network layer based defense solutions suggested in the literature is also carried out.</div>


Sign in / Sign up

Export Citation Format

Share Document