Internet of Things Testing Framework, Automation, Challenges, Solutions and Practices

2022 ◽  
pp. 571-601
Author(s):  
Karthick G. S. ◽  
Pankajavalli P. B.

The internet of things (IoT) is aimed at modifying the life of people by adopting the possible computing techniques to the physical world, and thus transforming the computing environment from centralized form to decentralized form. Most of the smart devices receive the data from other smart devices over the network and perform actions based on their implemented programs. Thus, testing becomes an intensive process in the IoT that will require some normalization too. The composite architecture of IoT systems and their distinctive characteristics require different variants of testing to be done on the components of IoT systems. This chapter will discuss the necessity for IoT testing in terms of various criteria of identifying and fixing the problems in the IoT systems. In addition, this chapter examines the core components to be focused on IoT testing and testing scope based on IoT device classification. It also elaborates the various types of testing applied on healthcare IoT applications, and finally, this chapter summarizes the various challenges faced during IoT testing.

Author(s):  
Karthick G. S. ◽  
Pankajavalli P. B.

The internet of things (IoT) is aimed at modifying the life of people by adopting the possible computing techniques to the physical world, and thus transforming the computing environment from centralized form to decentralized form. Most of the smart devices receive the data from other smart devices over the network and perform actions based on their implemented programs. Thus, testing becomes an intensive process in the IoT that will require some normalization too. The composite architecture of IoT systems and their distinctive characteristics require different variants of testing to be done on the components of IoT systems. This chapter will discuss the necessity for IoT testing in terms of various criteria of identifying and fixing the problems in the IoT systems. In addition, this chapter examines the core components to be focused on IoT testing and testing scope based on IoT device classification. It also elaborates the various types of testing applied on healthcare IoT applications, and finally, this chapter summarizes the various challenges faced during IoT testing.


2019 ◽  
Vol 1 (2) ◽  
pp. 16 ◽  
Author(s):  
Deepak Choudhary

The Internet of Things (IoT) enables the integration of data from virtual and physical worlds. It involves smart objects that can understand and react to their environment in a variety of industrial, commercial and household settings. As the IoT expands the number of connected devices, there is the potential to allow cyber-attackers into the physical world in which we live, as they seize on security holes in these new systems. New security issues arise through the heterogeneity  of  IoT  applications and devices and their large-scale deployment.


2021 ◽  
Vol 9 (2) ◽  
Author(s):  
Feroz Khan A.B ◽  
◽  
Anandharaj G ◽  

The smart devices connected on the internet turn to be the internet of things, which connect other objects or devices through unique identifiers with the capability of transferring and receiving the information over the internet. There are numerous applications in different areas such as healthcare, home automation, transportation, military, agriculture, and still so many sectors that incorporate cutting-edge technologies of communication, networking, cloud computing, sensing, and actuation. With this huge increase in the number of connected devices, a strong security mechanism is required to protect the IoT devices. Hence, it is required to focus on the challenges and issues of IoT enabled applications to safeguard the entire network from the outside invasion. This paper discusses some of the challenges in building IoT applications, a detailed study of the existing security protocols, and its issues, and the potential of the IoT.


2021 ◽  
Vol 9 (1) ◽  
pp. 912-931
Author(s):  
Pavan Madduru

To meet the growing demand for mobile data traffic and the stringent requirements for Internet of Things (IoT) applications in emerging cities such as smart cities, healthcare, augmented / virtual reality (AR / VR), fifth-generation assistive technologies generation (5G) Suggest and use on the web. As a major emerging 5G technology and a major driver of the Internet of Things, Multiple Access Edge Computing (MEC), which integrates telecommunications and IT services, provides cloud computing capabilities at the edge of an access network. wireless (RAN). By providing maximum compute and storage resources, MEC can reduce end-user latency. Therefore, in this article we will take a closer look at 5G MEC and the Internet of Things. Analyze the main functions of MEC in 5G and IoT environments. It offers several core technologies that enable the use of MEC in 5G and IoT, such as cloud computing, SDN / NFV, information-oriented networks, virtual machines (VMs) and containers, smart devices, shared networks and computing offload. This article also provides an overview of MEC's ​​role in 5G and IoT, a detailed introduction to MEC-enabled 5G and IoT applications, and future perspectives for MEC integration with 5G and IoT. Additionally, this article will take a closer look at the MEC research challenges and unresolved issues around 5G and the Internet of Things. Finally, we propose a use case that MEC uses to obtain advanced intelligence in IoT scenarios.


Sensors ◽  
2020 ◽  
Vol 20 (12) ◽  
pp. 3459
Author(s):  
Yuhong Li ◽  
Xiang Su ◽  
Aaron Yi Ding ◽  
Anders Lindgren ◽  
Xiaoli Liu ◽  
...  

The Internet of Things (IoT) connects smart devices to enable various intelligent services. The deployment of IoT encounters several challenges, such as difficulties in controlling and managing IoT applications and networks, problems in programming existing IoT devices, long service provisioning time, underused resources, as well as complexity, isolation and scalability, among others. One fundamental concern is that current IoT networks lack flexibility and intelligence. A network-wide flexible control and management are missing in IoT networks. In addition, huge numbers of devices and large amounts of data are involved in IoT, but none of them have been tuned for supporting network management and control. In this paper, we argue that Software-defined Networking (SDN) together with the data generated by IoT applications can enhance the control and management of IoT in terms of flexibility and intelligence. We present a review for the evolution of SDN and IoT and analyze the benefits and challenges brought by the integration of SDN and IoT with the help of IoT data. We discuss the perspectives of knowledge-driven SDN for IoT through a new IoT architecture and illustrate how to realize Industry IoT by using the architecture. We also highlight the challenges and future research works toward realizing IoT with the knowledge-driven SDN.


Network ◽  
2021 ◽  
Vol 1 (3) ◽  
pp. 279-314
Author(s):  
Laith Farhan ◽  
Rasha Subhi Hameed ◽  
Asraa Safaa Ahmed ◽  
Ali Hussein Fadel ◽  
Waled Gheth ◽  
...  

The last decade has witnessed the rise of the proliferation of Internet-enabled devices. The Internet of Things (IoT) is becoming ever more pervasive in everyday life, connecting an ever-greater array of diverse physical objects. The key vision of the IoT is to bring a massive number of smart devices together in integrated and interconnected heterogeneous networks, making the Internet even more useful. Therefore, this paper introduces a brief introduction to the history and evolution of the Internet. Then, it presents the IoT, which is followed by a list of application domains and enabling technologies. The wireless sensor network (WSN) is revealed as one of the important elements in IoT applications, and the paper describes the relationship between WSNs and the IoT. This research is concerned with developing energy-efficiency techniques for WSNs that enable the IoT. After having identified sources of energy wastage, this paper reviews the literature that discusses the most relevant methods to minimizing the energy exhaustion of IoT and WSNs. We also identify the gaps in the existing literature in terms of energy preservation measures that could be researched and it can be considered in future works. The survey gives a near-complete and up-to-date view of the IoT in the energy field. It provides a summary and recommendations of a large range of energy-efficiency methods proposed in the literature that will help and support future researchers. Please note that the manuscript is an extended version and based on the summary of the Ph.D. thesis. This paper will give to the researchers an introduction to what they need to know and understand about the networks, WSNs, and IoT applications from scratch. Thus, the fundamental purpose of this paper is to introduce research trends and recent work on the use of IoT technology and the conclusion that has been reached as a result of undertaking the Ph.D. study.


2018 ◽  
Vol 28 (5) ◽  
pp. 1705-1711
Author(s):  
Verda Misimi ◽  
Miranda Xhaferi

Communication between people isunavoidable nowadays; sending and receiving information through internet among people is our daily routine which is known as Internet of People. Hence, this kind of communication has grown even more, making possible to communicate not just people but also things which is known as Internet of Things, one of the trendiest technology. The Internet of Things or IoT refers to the billions of physical devices around the world that are now connected to the internet, collecting and sharing data.The increase of population in urban places and their requirements impose the creation of a system that will satisfy all of these requirements. Due to the increasing number of population the numbers of things that people own has grown enormously. Therefore, this fact generated the idea of adding sensors and intelligence to basic objects. Thanks to cheap processors, wireless network,sensors and actuators is possible to turn anything, from a pill to an aeroplane, into part of the Internet of Things. Combining these digital things in the past was very difficult or barely possible simply because the technology was not ready. The IoT integrates the interconnectedness of human culture- our “things” with the interconnectedness of our digital information system- “the internet”.The development of modern technologies and the Internet of Things establishmentmerged the digital and physical worlds, namely adding digital intelligence to devices that would be otherwise dumb, enabling them to communicate.The potential of this tendencyincreases day by day, enabling a very wide usage. The Internet of Things aims to provide a simple interaction between the physical world and virtual world, integrating a large number of devices of the real world to the internet. The Internet of Things promises to make our environment - our homes,offices and vehicles smarter, more measurable and chattier.The benefits of Internet of Things depend on the particular implementation, but the key is that enterprises should have access to more data about their own things and their own internal system and a greater ability to make changes as a result. It is impossible to predict all IoT applications considering the swift progress of technology and the diversely requirements of consumers. Thus, in our paper we will mention some of the most used and most important applications of IoT, as well the benefits of its implementation in different platforms in different environments. In the end, we emphasize the challenges we face during IoT application, moreoverthe common issues in the adoption of IoT on a large scale.


2021 ◽  
Vol 39 (4) ◽  
pp. 1-33
Author(s):  
Fulvio Corno ◽  
Luigi De Russis ◽  
Alberto Monge Roffarello

In the Internet of Things era, users are willing to personalize the joint behavior of their connected entities, i.e., smart devices and online service, by means of trigger-action rules such as “IF the entrance Nest security camera detects a movement, THEN blink the Philips Hue lamp in the kitchen.” Unfortunately, the spread of new supported technologies makes the number of possible combinations between triggers and actions continuously growing, thus motivating the need of assisting users in discovering new rules and functionality, e.g., through recommendation techniques. To this end, we present , a semantic Conversational Search and Recommendation (CSR) system able to suggest pertinent IF-THEN rules that can be easily deployed in different contexts starting from an abstract user’s need. By exploiting a conversational agent, the user can communicate her current personalization intention by specifying a set of functionality at a high level, e.g., to decrease the temperature of a room when she left it. Stemming from this input, implements a semantic recommendation process that takes into account ( a ) the current user’s intention , ( b ) the connected entities owned by the user, and ( c ) the user’s long-term preferences revealed by her profile. If not satisfied with the suggestions, then the user can converse with the system to provide further feedback, i.e., a short-term preference , thus allowing to provide refined recommendations that better align with the original intention. We evaluate by running different offline experiments with simulated users and real-world data. First, we test the recommendation process in different configurations, and we show that recommendation accuracy and similarity with target items increase as the interaction between the algorithm and the user proceeds. Then, we compare with other similar baseline recommender systems. Results are promising and demonstrate the effectiveness of in recommending IF-THEN rules that satisfy the current personalization intention of the user.


Connectivity ◽  
2020 ◽  
Vol 148 (6) ◽  
Author(s):  
S. A. Zhezhkun ◽  
◽  
L. B. Veksler ◽  
S. M. Brezitsʹkyy ◽  
B. O. Tarasyuk

This article focuses on the analysis of promising technologies for long-range traffic transmission for the implementation of the Internet of Things. The result of the review of technical features of technologies, their advantages and disadvantages is given. A comparative analysis was performed. An analysis is made that in the future heterogeneous structures based on the integration of many used radio technologies will play a crucial role in the implementation of fifth generation networks and systems. The Internet of Things (IoT) is heavily affecting our daily lives in many domains, ranging from tiny wearable devices to large industrial systems. Consequently, a wide variety of IoT applications have been developed and deployed using different IoT frameworks. An IoT framework is a set of guiding rules, protocols, and standards which simplify the implementation of IoT applications. The success of these applications mainly depends on the ecosystem characteristics of the IoT framework, with the emphasis on the security mechanisms employed in it, where issues related to security and privacy are pivotal. In this paper, we survey the security of the main IoT frameworks, a total of 8 frameworks are considered. For each framework, we clarify the proposed architecture, the essentials of developing third-party smart apps, the compatible hardware, and the security features. Comparing security architectures shows that the same standards used for securing communications, whereas different methodologies followed for providing other security properties.


2020 ◽  
Author(s):  
Anbiao Huang ◽  
Shuo Gao ◽  
Arokia Nathan

In Internet of Things (IoT) applications, among various authentication techniques, keystroke authentication methods based on a user’s touch behavior have received increasing attention, due to their unique benefits. In this paper, we present a technique for obtaining high user authentication accuracy by utilizing a user’s touch time and force information, which are obtained from an assembled piezoelectric touch panel. After combining artificial neural networks with the user’s touch features, an equal error rate (EER) of 1.09% is achieved, and hence advancing the development of security techniques in the field of IoT.


Sign in / Sign up

Export Citation Format

Share Document