scholarly journals A Composite Model for an Intelligent Device-To-Device Communication in the Internet of Things

Similar to how humans communicate, devices will have to communicate with each other in the Internet of Things (IoT) ecosystem. Where the devices themselves become the users of the knowledge or the data that is acquired. Hence we can say that device-to-device communication becomes an intrinsic part of IoT. Devices have to communicate autonomously with each other without any centralized monitoring system. It will be more powerful when the devices can communicate in a multi-hop manner rather than a single-hop manner where the information when and where needed can be accumulated and used. This leads to a need where there must be a group communication between the devices in a particular network. Hence information about the network and the environment in which the devices operate can be identified and the relevant knowledge can be transferred to a peer network or a device for further information gathering or the peer nodes can be used as intermediate nodes in the multi-hop network. Here we are proposing a network of multi-hop interconnected intelligent IoT devices that can communicate among its peer devices gather information and send the information in a multi-hop fashion making using of the adjacent networks or clusters.

2020 ◽  
Vol 19 ◽  

The current IP and other networks such as Power Smart Grids are fast evolving, thus resulting in diverse connectivity methodologies. This has led to the emergence of "the Internet of Things” (IoT) methodologywhose goal is to transform the current IP and related networks to Device-to-Device (D-2-D) basis. It will seamlessly interconnect the globe via intelligent devices and sensors of varying types, this resulting in voluminousgeneration and exchange of data in excess of 20 billion Internet-connected objects and sensors (things) by 2022.The resultant structure will benefit mankind by helping us make tough decisions as well as be provisioned ofbeneficial services. In this paper, we overview both IoT enabled network architecture as well as security forassociated objects and devices. We commence with a description of a generalized IoT enabled network's security architecture as well as how the various elements constituting them interact. We then describe an approachthat allows the protection of both constrained and unconstrained IoT devices through robust encryption as wellas authentication so that both can equally leverage from the same security framework, but still maintaining lowcomputational loads, by avoiding excessive computational operations.


2021 ◽  
Vol 58 ◽  
pp. 102772
Author(s):  
André Lizardo ◽  
Raul Barbosa ◽  
Samuel Neves ◽  
Jaime Correia ◽  
Filipe Araujo

2018 ◽  
Author(s):  
Henry Tranter

Security is always at the forefront of developing technologies. One can seldom go a week without hearing of a new data breach or hacking attempt from various groups around the world, often taking advantage of a simple flaw in a system’s architecture. The Internet of Things (IoT) is one of these developing technologies which may be at risk of such attacks. IoT devices are becoming more and more prevalent in everyday life. From keeping track of an individual’s health, to suggesting meals from items available in an individual’s fridge, these technologies are taking a much larger role in the personal lives of their users. With this in mind, how is security being considered in the development of these technologies? Are these devices that monitor individual’s personal lives just additional vectors for potential data theft? Throughout this survey, various approaches to the development of security systems concerning IoT devices in the home will be discussed, compared, and contrasted in the hope of providing an ideal solution to the problems this technology may produce.


Sign in / Sign up

Export Citation Format

Share Document