Research on Mobile Information Access Based on Internet of Things

2014 ◽  
Vol 539 ◽  
pp. 460-463 ◽  
Author(s):  
Jiang Tao Geng ◽  
Xiao Bo Xiong

The paper design mobile information collection system based on Internet of Things, implemented access gateway by smart mobile devices through a variety of ways, such as Wi-Fi and access the underlying perceptual information based on ZigBee wireless sensor networks. On the one hand, For information sensitivity of the sensor network, we design the mobile terminal through the gateway access authentication protocol, and effective solute the authentication and information between mobile devices and gateways, gateway and sensor network nodes obtain permission problem; on the other hand, according to the practical application of mobile information collection characteristics, the paper proposed information collection strategy based on historical data movement path to solve the problem for too long the device connection is established when the mobile smart devices collecting information along fixed lines, increasing the actual data transmission time and improve the efficiency of information transmission.

2015 ◽  
Vol 2015 ◽  
pp. 1-23 ◽  
Author(s):  
Chi-Yo Huang ◽  
Yu-Sheng Kao

The smart mobile devices have emerged during the past decade and have become one of the most dominant consumer electronic products. Therefore, exploring and understanding the factors which can influence the acceptance of novel mobile technology have become the essential task for the vendors and distributors of mobile devices. The Phablets, integrated smart devices combining the functionality and characteristics of both tablet PCs and smart phones, have gradually become possible alternatives for smart phones. Therefore, predicting factors which can influence the acceptance of Phablets have become indispensable for designing, manufacturing, and marketing of such mobile devices. However, such predictions are not easy. Meanwhile, very few researches tried to study related issues. Consequently, the authors aim to explore and predict the intentions to use and use behaviors of Phablets. The second generation of the Unified Theory of Acceptance and Use of Technology (UTAUT2) is introduced as a theoretic basis. The Decision Making Trial and Evaluation Laboratory (DEMATEL) based Network Process (DNP) will be used to construct the analytic framework. In light of the analytic results, the causal relationships being derived by the DEMATEL demonstrate the direct influence of the habit on other dimensions. Also, based on the influence weights being derived, the use intention, hedonic motivation, and performance expectancy are the most important dimensions. The analytic results can serve as a basis for concept developments, marketing strategy definitions, and new product designs of the future Phablets. The proposed analytic framework can also be used for predicting and analyzing consumers’ preferences toward future mobile devices.


2018 ◽  
Vol 2018 ◽  
pp. 1-14 ◽  
Author(s):  
Qi Gao ◽  
Junwei Zhang ◽  
Jianfeng Ma ◽  
Chao Yang ◽  
Jingjing Guo ◽  
...  

With the fast development of Logistics Internet of Things and smart devices, the security of express information processed by mobile devices in Logistics Internet of Things has attracted much attention. However, the existing secure express schemes only focus on privacy protection of personal information but do not consider the security of the logistics information against couriers with malicious mobile devices. For example, a privacy-preserving delivery path should be required in order to prevent the privacy leakage in the express delivery procedure. Therefore, besides the security of personal information, the privacy protection of logistics information and authentication of mobile devices used in express company are important to security in Logistics Internet of Things. In this paper, we propose a secure logistics information scheme LIP-PA to provide privacy protection of both personal information and logistics information. First, we define the basic requirements of Logistics Internet of Things. Then, using attribute-based encryption and position-based key exchange, we propose a logistics information privacy protection scheme with position and attribute-based access control for mobile devices. The analysis results show that our scheme satisfies the defined requirements. Finally, the performance of our scheme is evaluated and the experiment results show that our scheme is efficient and feasible for mobile devices in real parcel delivery scenario.


2013 ◽  
Vol 712-715 ◽  
pp. 1872-1875
Author(s):  
Yi Ying Zhang ◽  
Hui Li ◽  
De Quan Gao ◽  
Jin Ping Cao

With the development of internet of things (IoT), various of sensors play important roles in applications, especially in smart grid. The electrical substations usually deploy many sesors to sense the environment or control power facilities etc., such as temperature and humidity sensor, SF6sensor etc, to organize as a wireless sensor network (WSN) to cooperate for intelligent operation. In this paper, we deploy some special sensors in the substation and design a hierarchical architecture of WSN for information collection. According to the observation and operation result, the wireless sensor network can effectively acquire the environmental object and monitor the substation assets, which can effectively improve the operation capability of substation.


2017 ◽  
Author(s):  
André Felipe Suzano Massa ◽  
Leandro Tiago Manera ◽  
Mauricio Martins Donatti ◽  
Orlando F. Lima Jr. ◽  
Ana P. Noletto

2019 ◽  
Vol 11 (10) ◽  
pp. 215
Author(s):  
Behan ◽  
Krejcar ◽  
Sabbah ◽  
Selamat

: Today’s digital society is interconnected and networked, with modern smart devices ubiquitously built into and embedded within smart environments and other environments, where people (their users) typically live. It is very important to mention that sensorial awareness of an environment depends on one’s current location and equipment, as well as the equipment’s real-time capabilities. Personal sensorial information is considered to be the key factor for progress in the improvement of the productivity of everyday life and creation of a smart surrounding environment. This paper describes the design, implementation, and testing process of a new sensorial framework based on the current possibilities created by ubiquitous smart mobile devices with sensors, which involves computing power and battery power issues. The two parts of the proposed framework have been designed, implemented, and tested. The client part is represented by a front-end mobile application, and the back-end part is represented by a server-side application. The analysis of the data, captured during the testing phase, involves the analysis of the processing time, battery consumption, and transmitted data amount. This analysis reveals that Transmission Control Protocol (TCP) and user datagram protocol (UDP) protocols have a comparable performance, although TCP is preferable for use in local networks. In comparison to other solutions such as MobiSense or Feel the World framework, the final solution of the proposed and developed sensorial framework has two main capabilities, which are the security support and social networking possibilities. The advantage of the MobiSense platform is the existence of several real-world applications, whereas the proposed sensorial framework needs to be verified in the massive context of many users in real time.


2016 ◽  
Vol 1 (1) ◽  
Author(s):  
Tahsin YAGCI

In recent years advances in social networking and rapid developments in wireless internet technologies stimulated all of us to integrate and use them in our lives. Smart mobile technology industries are racing with each other to launch the newest model for their consumers. The biggest market beyond the dispute is teenagers and young generation. Of course, the adults cannot be ignored, either. The general aim to use the social network is for communication and sharing information. During the daytime students want to keep in touch with their peers. The most common electronic devices are smart mobile phones and the top rate for social networking website is Facebook. This study aims to seek for and clarify the perceptions and the attitudes of undergraduate students in Northern Iraq, using electronic devices, in particular, smart mobile devices. What kinds of social media tools and platforms they are registered to? How often do they benefit from their accounts? What is their frequency to login to internet access and what part of the day do students use their mobile devices? What are students’ general purposes to use social media? – these were the questions asked in the research. This article emphasizes the diversity according to gender, faculty, grade, universities, etc. In addition, it seeks for the distribution of social media accounts. An online survey, conducted among different university students to recognize the ratio between various institutions, came to a conclusion that undergraduate students in Northern Iraq are equipped with sufficient smart devices to get involved in mobile learning via using social platforms such as Facebook, Instagram, Twitter, etc.  


2015 ◽  
Vol 2015 ◽  
pp. 1-13 ◽  
Author(s):  
Aymen Abdullah Alsaffar ◽  
Young-Rok Shin ◽  
Eui-Nam Huh

These days, the advancing of smart devices (e.g. smart phones, tablets, PC, etc.) capabilities and the increase of internet bandwidth enables IPTV service provider to extend their services to smart mobile devices. User can just receive their IPTV service using any smart devices by accessing the internet via wireless network from anywhere anytime in the world which is convenience for users. However, wireless network communication has well a known critical security threats and vulnerabilities to user smart devices and IPTV service such as user identity theft, reply attack, MIM attack, and so forth. A secure authentication for user devices and multimedia protection mechanism is necessary to protect both user devices and IPTV services. As result, we proposed framework of IPTV service based on secure authentication mechanism and lightweight content encryption method for screen-migration in Cloud computing. We used cryptographic nonce combined with user ID and password to authenticate user device in any mobile terminal they passes by. In addition we used Lightweight content encryption to protect and reduce the content decode overload at mobile terminals. Our proposed authentication mechanism reduces the computational processing by 30% comparing to other authentication mechanism and our lightweight content encryption reduces encryption delay to 0.259 second.


Sign in / Sign up

Export Citation Format

Share Document