scholarly journals Enhanced Bandwidth Allocation Technique and Protocol Standards to Improve QoS in Internet of Things

Internet of Things (IoT) is efficiently plays vital role in development of several sectors by offering many opportunities to grow the economy and improve the life standard through connecting billions of “Things” which provides business opportunities in different sectors and encounter many technical and application challenges. This paper emphasizes the role of Dynamic bandwidth allocation and protocols standards in various IoT sectors such as healthcare, education, agriculture, industrial, transportation, smart cities etc., and focuses on the challenges in providing uninterrupted bandwidth to all IoT devices with existing infrastructure, which depends on standardized protocols and network devices to establish connection with heterogeneous IoT devices. This paper covers Enhanced Dynamic Bandwidth Techniques, protocol standards and policies in IoT network technologies to Improve QoS in IoT devices.

2021 ◽  
pp. 254-261
Author(s):  
R. Mohandas ◽  
D. John Aravindhar

Worldwide, Internet of Things (IoT) devices will surpass a range of five billion by 2025 and developed countries will extend to advance by supplying almost two-thirds of such connections. With existing infrastructure, allocating bandwidth to billions of IoT devices is going to be cumbersome. This paper addresses the problem of Dynamic bandwidth allocation in IoT devices. We enhanced the dynamic bandwidth allocation algorithms to support QoS in different bandwidth ranges. Our Proposed innovative Machine learning-based Intelligent Dynamic Bandwidth Allocation (IDBA) algorithm allocates the bandwidth effectively between IoT devices based on utilization patterns observed through machine learning methods. Moreover, we showed that an IDBA algorithm results in supporting quality of service in terms of ensuring uninterrupted bandwidth to critical IoT application where bandwidth tolerance is zero percent, along with that IDBA increasing the network throughput correlated to other dynamic bandwidth allocation algorithms. We demonstrate simulations in different applications. The results show that IDBA achieves better throughput even in low bandwidth range.


Sensors ◽  
2021 ◽  
Vol 21 (5) ◽  
pp. 1598
Author(s):  
Sigurd Frej Joel Jørgensen Ankergård ◽  
Edlira Dushku ◽  
Nicola Dragoni

The Internet of Things (IoT) ecosystem comprises billions of heterogeneous Internet-connected devices which are revolutionizing many domains, such as healthcare, transportation, smart cities, to mention only a few. Along with the unprecedented new opportunities, the IoT revolution is creating an enormous attack surface for potential sophisticated cyber attacks. In this context, Remote Attestation (RA) has gained wide interest as an important security technique to remotely detect adversarial presence and assure the legitimate state of an IoT device. While many RA approaches proposed in the literature make different assumptions regarding the architecture of IoT devices and adversary capabilities, most typical RA schemes rely on minimal Root of Trust by leveraging hardware that guarantees code and memory isolation. However, the presence of a specialized hardware is not always a realistic assumption, for instance, in the context of legacy IoT devices and resource-constrained IoT devices. In this paper, we survey and analyze existing software-based RA schemes (i.e., RA schemes not relying on specialized hardware components) through the lens of IoT. In particular, we provide a comprehensive overview of their design characteristics and security capabilities, analyzing their advantages and disadvantages. Finally, we discuss the opportunities that these RA schemes bring in attesting legacy and resource-constrained IoT devices, along with open research issues.


Author(s):  
Tanweer Alam

In next-generation computing, the role of cloud, internet and smart devices will be capacious. Nowadays we all are familiar with the word smart. This word is used a number of times in our daily life. The Internet of Things (IoT) will produce remarkable different kinds of information from different resources. It can store big data in the cloud. The fog computing acts as an interface between cloud and IoT. The extension of fog in this framework works on physical things under IoT. The IoT devices are called fog nodes, they can have accessed anywhere within the range of the network. The blockchain is a novel approach to record the transactions in a sequence securely. Developing a new blockchains based middleware framework in the architecture of the Internet of Things is one of the critical issues of wireless networking where resolving such an issue would result in constant growth in the use and popularity of IoT. The proposed research creates a framework for providing the middleware framework in the internet of smart devices network for the internet of things using blockchains technology. Our main contribution links a new study that integrates blockchains to the Internet of things and provides communication security to the internet of smart devices.


Author(s):  
Mohd Javaid ◽  
Abid Haleem ◽  
Ravi Pratap Singh ◽  
Rajiv Suman

Artificial intelligence (AI) contributes to the recent developments in Industry 4.0. Industries are focusing on improving product consistency, productivity and reducing operating costs, and they want to achieve this with the collaborative partnership between robotics and people. In smart industries, hyperconnected manufacturing processes depend on different machines that interact using AI automation systems by capturing and interpreting all data types. Smart platforms of automation can play a decisive role in transforming modern production. AI provides appropriate information to take decision-making and alert people of possible malfunctions. Industries will use AI to process data transmitted from the Internet of things (IoT) devices and connected machines based on their desire to integrate them into their equipment. It provides companies with the ability to track their entire end-to-end activities and processes fully. This literature review-based paper aims to brief the vital role of AI in successfully implementing Industry 4.0. Accordingly, the research objectives are crafted to facilitate researchers, practitioners, students and industry professionals in this paper. First, it discusses the significant technological features and traits of AI, critical for Industry 4.0. Second, this paper identifies the significant advancements and various challenges enabling the implementation of AI for Industry 4.0. Finally, the paper identifies and discusses significant applications of AI for Industry 4.0. With an extensive review-based exploration, we see that the advantages of AI are widespread and the need for stakeholders in understanding the kind of automation platform they require in the new manufacturing order. Furthermore, this technology seeks correlations to avoid errors and eventually to anticipate them. Thus, AI technology is gradually accomplishing various goals of Industry 4.0.


Author(s):  
Kavitha Ammayappan ◽  
Arun Babu Puthuparambil ◽  
Atul Negi

Internet of things (IoT) is a buzzword around the globe. Academics and industries are evolving to solve real-world problems with emerging technologies; IoT is one among them. Now, it's very prevalent to see IoT devices in varied application domains like healthcare, hospitality, home, oil and gas, aviation, agriculture and marketing, cold storage chains, food preservation industries, automobile, environmental pollution monitoring sectors, energy industries, marine and fisheries, dairy and poultry, logistics, smart home and smart city, etc. Industries and research institutes are focusing to enrich environment and ecosystem to bring back green world again for the millennials and our future generations to make this globe as a potential place to cherish. In this mission, IoT is playing a major role of protection and preservation. In parallel, hackers are trying to destroy this mission by exploiting varied cyber vulnerabilities. To make IoT systems robust against those vulnerabilities it is necessary to understand the key vulnerabilities in detail.


Author(s):  
Rajan R. ◽  
Venkata Subramanian Dayanandan ◽  
Shankar P. ◽  
Ranganath Tngk

A smart city aims at developing an ecosystem wherein the citizens will have instant access to amenities required for a healthy and safe living. Since the mission of smart city is to develop and integrate many facilities, it is envisaged that there is a need for making the information available instantly for right use of such infrastructure. So, there exists a need to design and implement a world-class physical security measures which acts as a bellwether to protect people life from physical security threats. It is a myth that if placing adequate number of cameras alone would enhance physical security controls in smart cities. There is a need for designing and building comprehensive physical security controls, based on the principles of “layered defense-in-depth,” which integrates all aspects of physical security controls. This chapter will review presence of existing physical security technology controls for smart cities in line with the known security threats and propose the need for an AI-enabled physical security premise.


Author(s):  
K. Dinesh Kumar ◽  
Venkata Rathnam T. ◽  
Venkata Ramana R. ◽  
M. Sudhakara ◽  
Ravi Kumar Poluru

Internet of things (IoT) technology plays a vital role in the current technologies because IoT develops a network by integrating different kinds of objects and sensors to create the communication among objects directly without human interaction. With the presence of internet of things technology in our daily comes smart thinking and various advantages. At the same time, secure systems have been a most important concern for the protection of information systems and networks. However, adopting traditional security management systems in the internet of things leads several issues due to the limited privacy and policies like privacy standards, protocol stacks, and authentication rules. Usually, IoT devices has limited network capacities, storage, and computing processors. So they are having more chances to attacks. Data security, privacy, and reliability are three main challenges in the IoT security domain. To address the solutions for the above issues, IoT technology has to provide advanced privacy and policies in this large incoming data source. Blockchain is one of the trending technologies in the privacy management to provide the security. So this chapter is focused on the blockchain technologies which can be able to solve several IoT security issues. This review mainly focused on the state-of-the-art IoT security issues and vulnerabilities by existing review works in the IoT security domains. The taxonomy is presented about security issues in the view of communication, architecture, and applications. Also presented are the challenges of IoT security management systems. The main aim of this chapter is to describe the importance of blockchain technology in IoT security systems. Finally, it highlights the future directions of blockchain technology roles in IoT systems, which can be helpful for further improvements.


2021 ◽  
Vol 2021 ◽  
pp. 1-14
Author(s):  
Sabeeh Ahmad Saeed ◽  
Farrukh Zeeshan Khan ◽  
Zeshan Iqbal ◽  
Roobaea Alroobaea ◽  
Muneer Ahmad ◽  
...  

Internet of Things (IoT) is considered one of the world’s ruling technologies. Billions of IoT devices connected together through IoT forming smart cities. As the concept grows, it is very challenging to design an infrastructure that is capable of handling large number of devices and process data effectively in a smart city paradigm. This paper proposed a structure for smart cities. It is implemented using a lightweight easy to implement network design and a simpler data format for information exchange that is suitable for developing countries like Pakistan. Using MQTT as network protocol, different sensor nodes were deployed for collecting data from the environment. Environmental factors like temperature, moisture, humidity, and percentage of CO2 and methane gas were recorded and transferred to sink node for information sharing over the IoT cloud using an MQTT broker that can be accessed any time using Mosquitto client. The experiment results provide the performance analysis of the proposed network at different QoS levels for the MQTT protocol for IoT-based smart cities. JSON structure is used to formulate the communication data structure for the proposed system.


2021 ◽  
Vol 2021 ◽  
pp. 1-11
Author(s):  
Runnan Zhang ◽  
Gang Liu ◽  
Shancang Li ◽  
Yongheng Wei ◽  
Quan Wang

Smart cities require new access control models for Internet of Things (IoT) devices that preserve user privacy while guaranteeing scalability and efficiency. Researchers believe that anonymous access can protect the private information even if the private information is not stored in authorization organization. Many attribute-based access control (ABAC) models that support anonymous access expose the attributes of the subject to the authorization organization during the authorization process, which allows the authorization organization to obtain the attributes of the subject and infer the identity of the subject. The ABAC with anonymous access proposed in this paper called ABSAC strengthens the identity-less of ABAC by combining homomorphic attribute-based signatures (HABSs) which does not send the subject attributes to the authorization organization, reducing the risk of subject identity re-identification. It is a secure anonymous access framework. Tests show that the performance of ABSAC implementation is similar to ABAC’s performance.


Sign in / Sign up

Export Citation Format

Share Document