scholarly journals Algorithmic Analysis on Adaptive Dragonfly based Optimal Key Generation for Privacy Preservation in IoT

The Internet of Things (IoT) is a network of Internet-enabled devices that can sense, communicate, and react to changes in their environment. It is commonly applied in many applications, like building automation, medical healthcare systems, transportation, environment monitoring, and energy management. Billions of these computing devices are connected to the Internet to exchange data between themselves and/or their infrastructure. However, the privacy of data seems to be the greatest issue that needs to be solved. This paper intends to develop an improved data sanitization and restoration framework in IoT for higher-order privacy preservation. The preservation process is carried out using key that is optimally selected. For the optimal selection of key, a new Improved Dragonfly Algorithm (IDA) is introduced. Finally, the algorithmic analysis is carried out by varying parameters like enemy distraction weight e and food attraction weight f  of the proposed algorithm

2019 ◽  
Vol 92 ◽  
pp. 101744 ◽  
Author(s):  
George Margelis ◽  
Xenofon Fafoutis ◽  
George Oikonomou ◽  
Robert Piechocki ◽  
Theo Tryfonas ◽  
...  

2017 ◽  
Vol 2017 ◽  
pp. 1-12 ◽  
Author(s):  
Jaehyu Kim ◽  
JooSeok Song

With the advent of the Internet of Things (IoT) era, we are experiencing rapid technological progress. Billions of devices are connected to each other, and our homes, cities, hospitals, and schools are getting smarter and smarter. However, to realize the IoT, several challenging issues such as connecting resource-constrained devices to the Internet must be resolved. Recently introduced Low Power Wide Area Network (LPWAN) technologies have been devised to resolve this issue. Among many LPWAN candidates, the Long Range (LoRa) is one of the most promising technologies. The Long Range Wide Area Network (LoRaWAN) is a communication protocol for LoRa that provides basic security mechanisms. However, some security loopholes exist in LoRaWAN’s key update and session key generation. In this paper, we propose a dual key-based activation scheme for LoRaWAN. It resolves the problem of key updates not being fully supported. In addition, our scheme facilitates each layer in generating its own session key directly, which ensures the independence of all layers. Real-world experimental results compared with the original scheme show that the proposed scheme is totally feasible in terms of delay and battery consumption.


2013 ◽  
Vol 753-755 ◽  
pp. 2845-2848
Author(s):  
Ke Wang Huang

The paper focuses on improved ant colony algorithm using in design of the internet of things storage and mailbox system. The improved ant colony algorithm solves the problems of the location of the storage mailbox mounting and user selection of optimal delivery.


Author(s):  
Jing-Shu Sun ◽  
Teng Zhu ◽  
Marcin Wozniak

AbstractCurrent IoT communication node spacing selection process show may potential areas for improvements such as high delay ratio, high total energy consumption ratio, confusion of the optimal communication information band, intelligent spacing node design under the constraints of the energy-saving selection of IoT communication. Based on energy-saving constraints, the link status between nodes is evaluated through link stability and link quality. In order to prevent the generation of serious noisy nodes and frequency hopping data, the interference nodes under the intrusion of the Internet of Things are identified by determining transition amplitude of the noise nodes in the transmission data sequence. Finally, according to the calculation results of the optimal communication node selection, the design of the intelligent spacing selection model for the communication nodes of the Internet of Things is realized. The simulation results show that the established model not only reduces energy consumption of nodes, shortens the average transmission delay of nodes, but also improves anti-interference effect of node spacing selection.


Author(s):  
A. V. Trachuk ◽  
N. V. Linder

Empirical research is devoted to influence of quality and value of relationship of partners on acceptance of the Internet-of-Things (IoT) technologies. Research is based on carrying out interview in selection of 51 companies (157 respondents).Transformation of relationship of the industrial companies in the B2B markets as a result of introduction of technology of the Internet of things is shown. It is shown that the IoT technologies influence transformation of norms of relationship among which a key role play: information exchange, technical feasibility, flexibility, openness, technological acceptance, trust, lack of opportunism, monitoring of behavior of partners. IntroductionofIoTaddsonemorekeyinterrelationhavingnatureofblastingtechnology – information. Further it will demand “information as service” model development.Key characteristics of quality, and also function of value of the relationship, influencing acceptance by the companies of the IoT technologies are allocated. Рractical recommendations about application of the received results of research are presented.


2022 ◽  
pp. 132-148
Author(s):  
Kiran M. B. ◽  
Martin George Wynn

The Internet of Things (IoT) is formed by a set of physical objects with embedded sensors, connected using a network so that they can collect and exchange data. Though the concept looks simple, its deployment in industry has enormous potential to bring major business benefits and radical change. This chapter examines IoT technology and how it is being used in the corporate environment. Based on a review of existing literature and case examples, the various definitions and elements of IoT are discussed, followed by an assessment of how IoT is being used and what benefits are being delivered. Some key emergent themes are then examined – security aspects, the significance of 5G networks, and the need for an IoT strategy and project implementation guidelines. The chapter concludes by outlining possible areas for future research and suggests a step-change in the mega-infrastructure connecting IoT devices is imminent.


2018 ◽  
Vol 65 (3) ◽  
pp. 37 ◽  
Author(s):  
Nataliia V. Morze ◽  
Mariia A. Gladun ◽  
Serhii M. Dziuba

The article deals with issues related to STEM-education; the modern views of STEM-education and peculiarities of the introduction of robotics as one of its branches in the educational process, its influence on the motivation of students; the need to prepare students for the skills of the twenty-first century through the introduction of STEM-education, starting with elementary school. The results of the survey conducted among teachers and future teachers in Ukraine on introduction of robotics in the educational process are presented. The results of the survey are demonstrated. It has shown that the study of robotics or its integration into educational subjects helps to stimulate the student's learning motivation, develops the ability to solve problems and improves their research work, gives children the opportunity to create their own product, and in this process express creative thinking. The problem of preparation of teachers for conducting classes using robots, their integration into educational subjects and the selection of robotic designers was explored. The kits for robotics classes for different age groups are described as well as demonstrated the capabilities of robotic kits and features of their application. The questions of implementation of robotics as a component of profile training are considered. The article focuses on the emergence of new professions related to the internet of things and, as a consequence, new specializations in higher education institutions. There are four courses on teaching the Internet of things that explain the components of the Internet of things and the interconnections between them. There is a conclusion about the effectiveness of using various training robotic kits. They can cover a wide area of educational objectives which form the skills of the 21st century.


2020 ◽  
Vol 8 (6) ◽  
pp. 3892-3895

Internet of Things network today naturally is one of the huge quantities of devices from sensors linked through the communication framework to give value added service to the society and mankind. That allows equipment to be connected at anytime with anything rather using network and service. By 2020 there will be 50 to 100 billion devices connected to Internet and will generate heavy data that is to be analyzed for knowledge mining is a forecast. The data collected from individual devices of IoT is not going to give sufficient information to perform any type of analysis like disaster management, sentiment analysis, and smart cities and on surveillance. Privacy and Security related research increasing from last few years. IoT generated data is very huge, and the existing mechanisms like k- anonymity, l-diversity and differential privacy were not able to address these personal privacy issues because the Internet of Things Era is more vulnerable than the Internet Era [10][20]. To solve the personal privacy related problems researchers and IT professionals have to pay more attention to derive policies and to address the key issues of personal privacy preservation, so the utility and trade off will be increased to the Internet of Things applications. Personal Privacy Preserving Data Publication (PPPDP) is the area where the problems are identified and fixed in this IoT Era to ensure better personal privacy.


With the evolution of the Internet and related technologies, there has been an evolution of new paradigm, which is the Internet of Things (IoT). IoT is the network of physical objects, such as devices, embedded with electronics, software, sensors, and network connectivity that enables these objects to collect and exchange data. In the IoT, a large number of objects are connected to one another for information sharing, irrespective of their locations (Corcoran, 2016). Even though the IoT was defined at 1999, the concept of IoT has been in development for decades. As the technology and implementation of the IoT ideas move forward, different views for the concept of the IoT have appeared (Ma, 2011). Based on different views, in this book, the IoT is defined as a kind of modern technology, implicating machine to machine communications and person to computer communications will be extended to everything from everyday household objects to sensors monitoring the movement. Currently, we can see a few key areas of focus for the Internet of Things (IoT) that will require special attention over the course of the next decade on the part of computer science, energy technology, networks, wireless communication, and system platform. There are already a number of implementation case studies emerging from companies across a range of industry sectors.


Sign in / Sign up

Export Citation Format

Share Document