A Data Collecting and Caching Mechanism for Gateway Middleware in the Web of Things

2013 ◽  
Vol 756-759 ◽  
pp. 2157-2162
Author(s):  
Xu Chao Chang ◽  
Chun Hong Zhang ◽  
Li Sun

The Web of Things (WoT) is a refinement of the Internet of Things by integrating heterogeneous devices not only into the Internet (the network), but into the Web (the application layer). With the expansion of applications and devices, WoT Gateway Middleware is bearing more and more pressure from data processing, and therefore the WoT gateway middleware takes more time to respond to the requests of applications. A data collecting and caching mechanism is an effective solution to this problem. In this paper, we begin by describing the gateway middleware architecture with the focus on data collecting and caching functionality. Then the data collecting and caching (DCC) functionality module is discussed in detail. The DCC module supports three kinds of data collecting and caching modes: fundamental mode, configurable mode and adaptive mode. We finally demonstrate how these three modes work. A SMART HOME system is developed as the implementation to verify and discuss the proposed mechanism.

The internet of things is turning into an appealing framework worldview to acknowledge inter-connections throughout corporeal, digital as well as communal gaps. Through the connections amid the IoT, safety concerns befall important, along with it is huge to set up improved resolutions for safety protections. The IoT apparition of unlock data sharing is expert through using cloud registering concepts. Since IoT is depends on the web, safety concerns of internet will similarly emerge in IoT as well as IoT enclose three layers for example perception, transportation and application layers. The safety concerns, modernism along with solution recognized by the application layer are conversed about in this Paper. The principle focal point of this examination work is on Data Security Protection procedure for application layer


Sensors ◽  
2019 ◽  
Vol 19 (5) ◽  
pp. 1163 ◽  
Author(s):  
Víctor Caballero ◽  
Sergi Valbuena ◽  
David Vernet ◽  
Agustín Zaballos

The Internet of Things scenario is composed of an amalgamation of physical devices. Those physical devices are heterogeneous in their nature both in terms of communication protocols and in data exchange formats. The Web of Things emerged as a homogenization layer that uses well-established web technologies and semantic web technologies to exchange data. Therefore, the Web of Things enables such physical devices to the web, they become Web Things. Given such a massive number of services and processes that the Internet of Things/Web of Things enables, it has become almost mandatory to describe their properties and characteristics. Several web ontologies and description frameworks are devoted to that purpose. Ontologies such as SOSA/SSN or OWL-S describe the Web Things and their procedures to sense or actuate. For example, OWL-S complements SOSA/SSN in describing the procedures used for sensing/actuating. It is, however, not its scope to be specific enough to enable a computer program to interpret and execute the defined flow of control. In this work, it is our goal to investigate how we can model those procedures using web ontologies in a manner that allows us to directly deploy the procedure implementation. A prototype implementation of the results of our research is implemented along with an analysis of several use cases to show the generality of our proposal.


2019 ◽  
Vol 01 (02) ◽  
pp. 31-39 ◽  
Author(s):  
Duraipandian M. ◽  
Vinothkanna R.

The paper proposing the cloud based internet of things for the smart connected objects, concentrates on developing a smart home utilizing the internet of things, by providing the embedded labeling for all the tangible things at home and enabling them to be connected through the internet. The smart home proposed in the paper concentrates on the steps in reducing the electricity consumption of the appliances at the home by converting them into the smart connected objects using the cloud based internet of things and also concentrates on protecting the house from the theft and the robbery. The proposed smart home by turning the ordinary tangible objects into the smart connected objects shows considerable improvement in the energy consumption and the security provision.


2016 ◽  
pp. 1-31
Author(s):  
M. G. Michael

When or how uberveillance will be implemented in its full-blown manifestation is still a subject for some intriguing discussion and a topic of robust disagreement, but what is generally accepted by most of the interlocutors is that an “uberveillance society” will emerge sooner rather than later, and that one way or another this will mean an immense upheaval in all of our societal, business, and government relationships. What is apparent from the numerous qualitative and quantitative studies conducted is that microchipping people is a discernibly divisive issue. If we continue on the current trajectory, we will soon see further divisions – not just between those who have access to the Internet and those who do not, but between those who subjugate themselves to be physically connected to the Web of Things and People, and those who are content enough to simply have Internet connectivity through external devices like smart phones, to those who opt to live completely off the grid. Time will only tell how we as human-beings will adapt after we willingly adopt innovations with extreme and irreversible operations. This introduction serves to provide a background context for the term uberveillance, which has received significant international attention since its establishment.


Author(s):  
Maurice Dawson

Secure computing is essential as environments continue to become intertwined and hyperconnected. As the Internet of Things (IoT), Web of Things (WoT), and the Internet of Everything (IoE) dominate the landscape of technological platforms, protection these complicated networks is important. The everyday person who wishes to have more devices that allow the ability to be connected needs to be aware of what threats they could be potentially exposing themselves to. Additionally, for the unknowing consumer of everyday products needs to be aware of what it means to have sensors, Radio Frequency IDentification (RFID), Bluetooth, and WiFi enabled products. This submission explores how Availability, Integrity, and Confidentiality (AIC) can be applied to IoT, WoT, and IoE with consideration for the application of these architectures in the defense sector.


Author(s):  
Laura Belli ◽  
Simone Cirani ◽  
Luca Davoli ◽  
Gianluigi Ferrari ◽  
Lorenzo Melegari ◽  
...  

The Internet of Things (IoT) will consist of billions (50 billions by 2020) of interconnected heterogeneous devices denoted as “Smart Objects:” tiny, constrained devices which are going to be pervasively deployed in several contexts. To meet low-latency requirements, IoT applications must rely on specific architectures designed to handle the gigantic stream of data coming from Smart Objects. This paper propose a novel Cloud architecture for Big Stream applications that can efficiently handle data coming from Smart Objects through a Graph-based processing platform and deliver processed data to consumer applications with low latency. The authors reverse the traditional “Big Data” paradigm, where real-time constraints are not considered, and introduce the new “Big Stream” paradigm, which better fits IoT scenarios. The paper provides a performance evaluation of a practical open-source implementation of the proposed architecture. Other practical aspects, such as security considerations, and possible business oriented exploitation plans are presented.


Sign in / Sign up

Export Citation Format

Share Document