scholarly journals An Economical Incorporation of IoT and Edge/ Cloud Computing for Dynamic Distribution of IoT Analytics and Organized Utilization of Network Resources

As the Internet of Things (IoT) keeps on picking up application in telecommunication networks, an enormous number of devices are relied upon to be associated and utilised sooner rather than later. Wide scale Internet of Things (IoT) systems with several deployed IoT devices, such as sensors, actuators and so on, that generate a high volume of data is expected. This means that the volume of data is foretold to increase substantially. Customarily, cloud services have been executed in huge datacenters in the central network. Be that as it may, this is definitely not a long-haul adaptable choice as an exceptionally enormous number of gadgets are required to be associated and utilised sooner rather than later. An adaptable and productive arrangement is to disperse the IoT analytics between the core cloud and the network edge. This paper uses edge IoT analytics to viably and economically convey the information from the IoT between the core cloud and the network edge. First analytics can be completed on the edge cloud and just the essential information or results are sent for further investigation. We have identified an approach to make this operation increasingly affordable

Sensors ◽  
2018 ◽  
Vol 18 (8) ◽  
pp. 2664 ◽  
Author(s):  
Luis Belem Pacheco ◽  
Eduardo Pelinson Alchieri ◽  
Priscila Mendez Barreto

The use of Internet of Things (IoT) is rapidly growing and a huge amount of data is being generated by IoT devices. Cloud computing is a natural candidate to handle this data since it has enough power and capacity to process, store and control data access. Moreover, this approach brings several benefits to the IoT, such as the aggregation of all IoT data in a common place and the use of cloud services to consume this data and provide useful applications. However, enforcing user privacy when sending sensitive information to the cloud is a challenge. This work presents and evaluates an architecture to provide privacy in the integration of IoT and cloud computing. The proposed architecture, called PROTeCt—Privacy aRquitecture for integratiOn of internet of Things and Cloud computing, improves user privacy by implementing privacy enforcement at the IoT devices instead of at the gateway, as is usually done. Consequently, the proposed approach improves both system security and fault tolerance, since it removes the single point of failure (gateway). The proposed architecture is evaluated through an analytical analysis and simulations with severely constrained devices, where delay and energy consumption are evaluated and compared to other architectures. The obtained results show the practical feasibility of the proposed solutions and demonstrate that the overheads introduced in the IoT devices are worthwhile considering the increased level of privacy and security.


Author(s):  
Shen Xin En ◽  
Liu Si Ling ◽  
Fan Cheng Hao

In recent years, due to their frequent use and widespread use, IoT (Internet of Things) devices have become an attractive target for hackers. As a result of their limited network resources and complex operating systems, they are vulnerable to attacks. Using a honeypot can, therefore, be a very effective way of detecting malicious requests and capturing samples of exploits. The purpose of this article is to introduce honeypots, the rise of IoT devices, and how they can be exploited by attackers. Various honeypot ecosystems will be investigated further for capturing and analyzing information from attacks against these IoT devices. As well as how to leverage proactive strategies in terms of IoT security, it will provide insights on the attack vectors present in most IoT systems, along with understanding attack patterns.


Author(s):  
Saravanan K ◽  
P. Srinivasan

Cloud IoT has evolved from the convergence of Cloud computing with Internet of Things (IoT). The networked devices in the IoT world grow exponentially in the distributed computing paradigm and thus require the power of the Cloud to access and share computing and storage for these devices. Cloud offers scalable on-demand services to the IoT devices for effective communication and knowledge sharing. It alleviates the computational load of IoT, which makes the devices smarter. This chapter explores the different IoT services offered by the Cloud as well as application domains that are benefited by the Cloud IoT. The challenges on offloading the IoT computation into the Cloud are also discussed.


2020 ◽  
Vol 17 (1) ◽  
pp. 141-160
Author(s):  
Bojan Marinkovic ◽  
Zoran Ognjanovic ◽  
Paola Glavan ◽  
Anton Kos ◽  
Anton Umek

Internet of Things (IoT) can be seen as a cooperation of various devices with limited performances that participate in the same system. IoT devices compose a distributed architecture system. The core of every IoT system is its discovery and control services. To realize such services, some authors used the developed solutions from the different domains. One such solution is the Chord protocol, one of the first, the simplest and the most popular distributed protocols. Unfortunately, the application of the Chord protocol was realized using the correctness of the Chord protocol for granted, or by the very hard assumptions. In this paper we prove the correctness of the Chord protocol using the logic of time and knowledge with the respect to the set of possible executions, called regular runs. We provide the deterministic description of the correctness of the Chord protocol and consider Chord actions that maintain ring topology while the nodes can freely join or leave.


Webology ◽  
2021 ◽  
Vol 18 (2) ◽  
pp. 199-211
Author(s):  
Dr.N. Sudhakar Yadav ◽  
Dr.Ch. Mallikarjuna Rao ◽  
Dr.D.V. Lalitha Parameswari ◽  
Dr. K.L.S. Soujanya ◽  
Dr. Challa Madhavi Latha

Nowadays cloud environments are used by many business service sectors like healthcare, retail marketing, banking, and many business fields. At the same time, the usage of Internet of Things (IoT) devices in different sectors also increasing tremendously. So, there is a general problem for securing any business service in enterprise cloud environments restricting by only authorized devices. We are proposing cryptographic techniques with the help of a token-based framework by enabling a secure handshake between consuming applications and the source business service which aims to authorize the target end consumers of the respective business service. The proposed work aims to achieve the desired secure handshake so that any consuming application or device requests the desired business service with a secret token and an input combination. The source business service creates a secure token using any latest robust cryptographic algorithm on the above input combination and returns the token to the consuming application. The consuming application requests to the source business service, it must pass the above token which if validated then only would receive the required data. Hence, in this paper, we propose the delegation of the authorization task to the end consumers, who are responsible to fetch the security tokens and use them in their application lifecycle.


2020 ◽  
Vol 3 (1) ◽  
pp. 1-21 ◽  
Author(s):  
Basetty Mallikarjuna

The main aim of Internet of Things (IoT) is to get every “thing” (sensors, smart cameras, wearable devices, and smart home appliances) to connect to the internet. Henceforth to produce the high volume of data required for data processing between IoT devices, large storage and the huge number of applications to offer cloud computing as a service. The purpose of IoT-based-cloud is to manage the resources, and effective utilization of tasks in cloud. The end user applications are essential to enhance the QoS parameters. As per the QoS parameters, the service provider makes the speed up of tasks. There is a requirement for assigning responsibilities based on priority. The cloud services are increased to the network edge, and the planned model is under the Fog computing paradigm to reduce the makespan of time. The priority based fuzzy scheduling approach is brought by the dynamic feedback-based mechanism. The planned mechanism is verified with the diverse prevailing algorithms and evidenced that planned methodology is supported by effective results.


Electronics ◽  
2020 ◽  
Vol 9 (6) ◽  
pp. 1050 ◽  
Author(s):  
Yustus Eko Oktian ◽  
Sang-Gon Lee ◽  
Hoon Jae Lee

Many researchers challenge the possibility of using blockchain and smart contracts to disrupt the Internet of Things (IoT) architecture because of their security and decentralization guarantees. However, the state-of-the-art blockchain architecture is not scalable enough to satisfy the requirements of massive data traffics in the IoT environment. The main reason for this issue is one needs to choose the consensus trade-off between either coping with a high throughput or a high number of nodes. Consequently, this issue prevents the applicability of blockchain for IoT use cases. In this paper, we propose a scalable two-tiered hierarchical blockchain architecture for IoT. The first tier is a Core Engine, which is based on a Practical Byzantine Fault Tolerance (PBFT) consensus to cope with a high throughput, that supervises the underlying subordinate engines (sub-engines) as its second tier. This second tier comprises of the Payment, Compute, and Storage Engine, respectively. We can deploy multiple instances of these sub-engines as many as we need and as local as possible near to the IoT domains, where IoT devices reside, to cope with a high number of nodes. Furthermore, to further extend the scalability of the proposed architecture, we also provide additional scalability features on the Core Engine such as request aggregation, request prioritization, as well as sub-engine parallelism. We implement all of our engines and expose them to IoT applications through the Engine APIs. With these APIs, developers can build and run IoT applications in our architecture. Our evaluation results show that our proposed features on the Core Engine can indeed enhance the overall performance of our architecture. Moreover, based on our proof-of-concept IoT car rental application, we also show that the interoperability between sub-engines through the Core Engine is possible, even when the particular sub-engine is under sub-engine parallelism.


Author(s):  
Zoran Cekerevac ◽  
Zdenek Dvorak ◽  
Ludmila Prigoda ◽  
Petar Cekerevac

Understanding the term hacking as any unconventional way of interacting with some system it is easy to conclude that there are enormous number of people who hacked or tried to hack someone or something. The article, as result of author research, analyses hacking from different points of view, including hacker’s point of view as well as the defender’s point of view. Here are discussed questions like: Who are the hackers? Why do people hack? Law aspects of hacking, as well as some economic issues connected with hacking. At the end, some questions about victim protection are discussed together with the weakness that hackers can use for their own protection. The aim of the article is to make readers familiar with the possible risks of hacker's attacks on the mobile phones and on possible attacks in the announced flood of the internet of things (next IoT) devices.


Author(s):  
V. Lymarenko

Trends in technology lead to an increasing of their role in the development of humanity. Exactly “cloud technologies”, which are the basis for the technological development of the information society now, also they play the role of the leading tool of informatization of education, especially united with “edutainment”.During the development and implementation of software and network technologies in professional artistic education, the following issues remain unsolved: the provision of modern computer equipment and software, technical support for the stable work of information products, and the provision of selective authorized access for students to specific network resources. The methodology based on “cloud calculates” technology provides an opportunity to overcome these difficulties. And the last, but not at least, students may be attracted to the most promising areas of the development of modern information products.Actuality, practical significance, and insufficient development of these problems caused the choice of the topic of our research: “Terms of use of “edutainment” and “cloud technologies” in professional artistic education “.The aim of the research is to determine the conditions of the use of “edutainment” and “cloud technologies” in the preparation of future teachers of musical art.Methods of research: analysis of psychological and pedagogical literature in order to determine the state of development of the problem; synthesis, comparison, generalization for justifying the concepts of “edutainment” and “cloud technologies” and methods of their use in the educational process.This article deals with issues of the use of edutainment technologies and “cloud technologies”. It is offered conditions of using edutainment and “cloud technologies” in post-nonclassical professional art education on the example of subject “Musical Art”. Actual “cloud” services are analyzed and examples of their integration to educational process of professional art establishments are proposed.


2017 ◽  
Author(s):  
JOSEPH YIU

The increasing need for security in microcontrollers Security has long been a significant challenge in microcontroller applications(MCUs). Traditionally, many microcontroller systems did not have strong security measures against remote attacks as most of them are not connected to the Internet, and many microcontrollers are deemed to be cheap and simple. With the growth of IoT (Internet of Things), security in low cost microcontrollers moved toward the spotlight and the security requirements of these IoT devices are now just as critical as high-end systems due to:


Sign in / Sign up

Export Citation Format

Share Document