scholarly journals An Approach to Share Self-Taught Knowledge between Home IoT Devices at the Edge

Sensors ◽  
2019 ◽  
Vol 19 (4) ◽  
pp. 833 ◽  
Author(s):  
Ingook Jang ◽  
Donghun Lee ◽  
Jinchul Choi ◽  
Youngsung Son

The traditional Internet of Things (IoT) paradigm has evolved towards intelligent IoT applications which exploit knowledge produced by IoT devices using artificial intelligence techniques. Knowledge sharing between IoT devices is a challenging issue in this trend. In this paper, we propose a Knowledge of Things (KoT) framework which enables sharing self-taught knowledge between IoT devices which require similar or identical knowledge without help from the cloud. The proposed KoT framework allows an IoT device to effectively produce, cumulate, and share its self-taught knowledge with other devices at the edge in the vicinity. This framework can alleviate behavioral repetition in users and computational redundancy in systems in intelligent IoT applications. To demonstrate the feasibility of the proposed concept, we examine a smart home case study and build a prototype of the KoT framework-based smart home system. Experimental results show that the proposed KoT framework reduces the response time to use intelligent IoT devices from a user’s perspective and the power consumption for compuation from a system’s perspective.

Electronics ◽  
2021 ◽  
Vol 10 (14) ◽  
pp. 1615
Author(s):  
Zeeshan Ali Khan ◽  
Ubaid Abbasi ◽  
Sung Won Kim

Low power wide area networks (LPWAN) are comprised of small devices having restricted processing resources and limited energy budget. These devices are connected with each other using communication protocols. Considering their available resources, these devices can be used in a number of different Internet of Things (IoT) applications. Another interesting paradigm is machine learning, which can also be integrated with LPWAN technology to embed intelligence into these IoT applications. These machine learning-based applications combine intelligence with LPWAN and prove to be a useful tool. One such IoT application is in the medical field, where they can be used to provide multiple services. In the scenario of the COVID-19 pandemic, the importance of LPWAN-based medical services has gained particular attention. This article describes various COVID-19-related healthcare services, using the the applications of machine learning and LPWAN in improving the medical domain during the current COVID-19 pandemic. We validate our idea with the help of a case study that describes a way to reduce the spread of any pandemic using LPWAN technology and machine learning. The case study compares k-Nearest Neighbors (KNN) and trust-based algorithms for mitigating the flow of virus spread. The simulation results show the effectiveness of KNN for curtailing the COVID-19 spread.


Internet of Things(IoT) is playing a pivotal role in our daily life as well as in various fields like Health, agriculture, industries etc. In the go, the data in the various IoT applications will be easily available to the physical dominion and thus the process of ensuringthe security of the data will be a major concern. For the extensive implementation of the numerous applications of IoT , the data security is a critical component. In our work, we have developed an encryption technique to secure the data of IoT. With the help of Merkle-Hellman encryption the data collected from the various IoT devices are first of all encrypted and then the secret message is generated with the help of Elliptic Curve Cryptography.


Author(s):  
Saravanan K ◽  
P. Srinivasan

Cloud IoT has evolved from the convergence of Cloud computing with Internet of Things (IoT). The networked devices in the IoT world grow exponentially in the distributed computing paradigm and thus require the power of the Cloud to access and share computing and storage for these devices. Cloud offers scalable on-demand services to the IoT devices for effective communication and knowledge sharing. It alleviates the computational load of IoT, which makes the devices smarter. This chapter explores the different IoT services offered by the Cloud as well as application domains that are benefited by the Cloud IoT. The challenges on offloading the IoT computation into the Cloud are also discussed.


Author(s):  
Mònica Casabayó ◽  
Núria Agell

The aim of this chapter is to present a fuzzy segmentation model that combines statistical and Artificial Intelligence techniques to identify and quantify multifaceted consumers. One of the primary challenges faced by companies is getting to know their consumers. The latter are increasingly complex, versatile, ever-changing, and even contradictory; in other words, they are multifaceted. There is thus a need for techniques and tools to be able to segment this type of consumer in order to provide companies with the realistic information they need to make the appropriate marketing decisions. A real case study from the Spanish energy industry is included in this chapter to demonstrate the potential of the segmentation model being proposed.


2019 ◽  
Vol 2019 ◽  
pp. 1-19 ◽  
Author(s):  
Zeeshan Ali Khan ◽  
Peter Herrmann

Many Internet of Things (IoT) systems run on tiny connected devices that have to deal with severe processor and energy restrictions. Often, the limited processing resources do not allow the use of standard security mechanisms on the nodes, making IoT applications quite vulnerable to different types of attacks. This holds particularly for intrusion detection systems (IDS) that are usually too resource-heavy to be handled by small IoT devices. Thus, many IoT systems are not sufficiently protected against typical network attacks like Denial-of-Service (DoS) and routing attacks. On the other side, IDSs have already been successfully used in adjacent network types like Mobile Ad hoc Networks (MANET), Wireless Sensor Networks (WSN), and Cyber-Physical Systems (CPS) which, in part, face limitations similar to those of IoT applications. Moreover, there is research work ongoing that promises IDSs that may better fit to the limitations of IoT devices. In this article, we will give an overview about IDSs suited for IoT networks. Besides looking on approaches developed particularly for IoT, we introduce also work for the three similar network types mentioned above and discuss if they are also suitable for IoT systems. In addition, we present some suggestions for future research work that could be useful to make IoT networks more secure.


2018 ◽  
Vol 7 (4.6) ◽  
pp. 388
Author(s):  
G. A. Vani ◽  
M. Metilda Florence

The emergence of Internet of things (IoT) is due to its   ability to dutifully transfer the data through a network. Now the concern is that security is not considered as main priority while developing the product. IoT is prone to vulnerabilities where Botnet and DDoS kind of attacks are common and a major issue that has to be considered these days. Since IoT is in no way resistive to attacks, this paper is all about proposing a solution for the Distributed Denial of Services attack that happens on IoT platform. Light weight authentication is necessary for any IoT devices because to reduce the power consumption and increase the processing speed of the device [16]. The experimental setup is built on OS named Contiki with cooja simulator that suits to all the devices that are in the IoT environment.   


Author(s):  
Mamata Rath ◽  
Bibudhendu Pati

Adoption of Internet of Things (IoT) and Cloud of Things (CoT) in the current developing technology era are expected to be more and more invasive, making them important mechanism of the future Internet-based communication systems. Cloud of Things and Internet of Things (IoT) are two emerging as well as diversified advanced domains that are diversified in current technological scenario. Paradigm where Cloud and IoT are merged together is foreseen as disruptive and as an enabler of a large number of application scenarios. Due to the adoption of the Cloud and IoT paradigm a number of applications are gaining important technical attention. In the future, it is going to be more complicated a setup to handle security in technology. Information till now will severely get changed and it will be very tough to keep up with varying technology. Organisations will have to repeatedly switch over to new skill-based technology with respect to higher expenditure. Latest tools, methods and enough expertise are highly essential to control threats and vulnerability to computing systems. Keeping in view the integration of Cloud computing and IoT in the new domain of Cloud of things, the said article provides an up-to-date eminence of Cloud-based IoT applications and Cloud of Things with a focus on their security and application-oriented challenges. These challenges are then synthesized in detail to present a technical survey on various issues related to IoT security, concerns, adopted mechanisms and their positive security assurance using Cloud of Things.


Electronics ◽  
2020 ◽  
Vol 9 (11) ◽  
pp. 1925
Author(s):  
Soe Ye Yint Tun ◽  
Samaneh Madanian ◽  
Dave Parry

The elderly population is increasing globally, putting more pressure on aged care and public health systems. To address this issue and help increase the independence of older people, different digital technologies, including the Internet of things (IoT), can play an important role. Although there has been an increase in the number of studies in this field, most of them concentrate on IoT applications in elderly care from a technology perspective, with very little contribution from the clinical side. Therefore, this paper aims to investigate and identify the available IoT applications and their clinical utility for common diseases in elderly people. The results of this study could be useful for information technology professionals in developing and understanding the clinical requirements for IoT applications in healthcare for older people. Clinicians will also be informed about the clinical possibilities of using IoT devices in this area. Based on our findings, future research should focus on enhancing the clinical utility of current IoT applications in different settings and on developing new applications to support practitioners and older people.


Sign in / Sign up

Export Citation Format

Share Document