scholarly journals DOA- A New Approach to Identify IoT Devices

2021 ◽  
pp. 66-76
Author(s):  
MAHMOOD AL-BAHRI ◽  
WASIN ALKISHRI

The analysis of the possibility of building a system for identifying devices of the Internet of Things based on the Digital Object Architecture has been carried out. A model of the system of resolution handle system of Digital Object Identification as a queuing system is proposed. The analysis of the existing handle system. Is proposed an identification system model based on digital object architecture. Based on the developed model of the queuing system, an optimization experiment was performed, and the configuration of the resolution system was obtained, allowing to reduce the time for resolving the device identifier. The software of the existing handle system resolution was analyzed and ways of improving the algorithms with the aim of reducing the time for identifier resolution were proposed.

Author(s):  
А.С. Бородин ◽  
Р.В. Киричек ◽  
Д.Д. Сазонов ◽  
М.А. Рожков ◽  
А.В. Колесников ◽  
...  

Представлено описание системы идентификации на базе архитектуры цифровых объектов (Digital Object Architecture DOA), которая в настоящее время рассматривается в качестве приоритетной для идентификации устройств и приложений интернета вещей. Приведен анализ альтернативных идентификаторов и показаны преимущества DOA как для задач идентификации, так и для борьбы с контрафактом. В первой части статьи рассмотрены основные положения, связанные с идентификацией устройств интернета вещей, проведен анализ существующих подходов и решений по идентификации. Дано описание базовых компонентов архитектуры цифровых объектов DOA и дана оценка возможности ее применения для построения систем идентификации. A description of an identification system for IoT devices based on the Digital Object Architecture (DOA) is given. The analysis of alternative identifiers is carried out. The advantages of DOA for both identification and counterfeiting tasks have been shown. The first part of the article discusses the main provisions related to the identification of IoT devices.


Sensors ◽  
2021 ◽  
Vol 21 (18) ◽  
pp. 6220
Author(s):  
Cosmina Corches ◽  
Mihai Daraban ◽  
Liviu Miclea

Through the latest technological and conceptual developments, the centralized cloud-computing approach has moved to structures such as edge, fog, and the Internet of Things (IoT), approaching end users. As mobile network operators (MNOs) implement the new 5G standards, enterprise computing function shifts to the edge. In parallel to interconnection topics, there is the issue of global impact over the environment. The idea is to develop IoT devices to eliminate the greenhouse effect of current applications. Radio-frequency identification (RFID) is the technology that has this potential, and it can be used in applications ranging from identifying a person to granting access in a building. Past studies have focused on how to improve RFID communication or to achieve maximal throughput. However, for many applications, system latency and availability are critical aspects. This paper examines, through stochastic Petri nets (SPNs), the availability, dependability, and latency of an object-identification system that uses RFID tags. Through the performed analysis, the optimal balance between latency and throughput was identified. Analyzing multiple communication scenarios revealed the availability of such a system when deployed at the edge layer.


2021 ◽  
Author(s):  
Luis Emanuel Neves Jesus ◽  
Daniela Barreiro Claro ◽  
Tatiane Nogueira Rios

Abstract The Internet of Things (IoT) connects many devices daily together in the same environment. Each device may follow the set of rules from a static environment. A static environment is usually controlled by an expert who knows all the necessary rules to provide this environment. The violation of one rule can cause a feature interaction. A feature interaction occurs when two or more devices generate instability in an environment. In a dynamic environment like IoT, devices' inclusion, and exclusion make it impossible for an expert to maintain all these rules up-to-date. It is necessary to provide an automatic solution to avoid violating these rules and maintain the environment's good performance. Thus, this work introduces a new approach to detect a feature interaction in dynamic environments automatically. Almost all previous work provide static rules defined by an expert in a controlled environment to detect an interaction. However, this is not possible in dynamic environments because of the number of device interactions and the number of device connections in/out, which grow exponentially in IoT environments. We started with a lightweight systematic review to better position our research, and then we identified one gap to provide our solution. Thus, our method learns to detect the interactions based on data analysis and then automatically predict the device detections in IoT environments. Datasets were manually annotated. Experiments were performed, and results provide evidence that automatic detection of a set of device interactions is possible in similar or either in complementary domains.


2014 ◽  
Vol 7 (2) ◽  
pp. 195-203 ◽  
Author(s):  
Richard A. Formato

Variable Z0(VZ0) antenna technology is a new design or optimization methodology applicable to any antenna on any platform designed or optimized with any procedure. It should be particularly useful for wireless devices populating the Internet of Things. VZ0expands the design or decision space by adding another degree of freedom invariably leading to better antennas. A simple design example illustrates its effectiveness.


2022 ◽  
Vol 54 (7) ◽  
pp. 1-34
Author(s):  
Sophie Dramé-Maigné ◽  
Maryline Laurent ◽  
Laurent Castillo ◽  
Hervé Ganem

The Internet of Things is taking hold in our everyday life. Regrettably, the security of IoT devices is often being overlooked. Among the vast array of security issues plaguing the emerging IoT, we decide to focus on access control, as privacy, trust, and other security properties cannot be achieved without controlled access. This article classifies IoT access control solutions from the literature according to their architecture (e.g., centralized, hierarchical, federated, distributed) and examines the suitability of each one for access control purposes. Our analysis concludes that important properties such as auditability and revocation are missing from many proposals while hierarchical and federated architectures are neglected by the community. Finally, we provide an architecture-based taxonomy and future research directions: a focus on hybrid architectures, usability, flexibility, privacy, and revocation schemes in serverless authorization.


2018 ◽  
Author(s):  
Henry Tranter

Security is always at the forefront of developing technologies. One can seldom go a week without hearing of a new data breach or hacking attempt from various groups around the world, often taking advantage of a simple flaw in a system’s architecture. The Internet of Things (IoT) is one of these developing technologies which may be at risk of such attacks. IoT devices are becoming more and more prevalent in everyday life. From keeping track of an individual’s health, to suggesting meals from items available in an individual’s fridge, these technologies are taking a much larger role in the personal lives of their users. With this in mind, how is security being considered in the development of these technologies? Are these devices that monitor individual’s personal lives just additional vectors for potential data theft? Throughout this survey, various approaches to the development of security systems concerning IoT devices in the home will be discussed, compared, and contrasted in the hope of providing an ideal solution to the problems this technology may produce.


Author(s):  
Clinton Fernandes ◽  
Vijay Sivaraman

This article examines the implications of selected aspects of the Telecommunications (Interception and Access) Amendment (Data Retention) Act 2015, which was passed by the Australian Parliament in March 2015. It shows how the new law has strengthened protections for privacy. However, focusing on the investigatory implications, it shows how the law provides a tactical advantage to investigators who pursue whistleblowers and investigative journalists. The article exposes an apparent discrepancy in the way ‘journalist’ is defined across different pieces of legislation. It argues that although legislators’ interest has been overwhelmingly focused on communications data, the explosion of data generated by the so-called Internet-of-Things (IoT) is as important or more. It shows how the sensors in selected IoT devices lead to a loss of user control and will enable non-stop, involuntary and ubiquitous monitoring of individuals. It suggests that the law will need to be amended further once legislators and investigators’ knowledge of the potential of IoT increases. 


Author(s):  
Tanweer Alam

In next-generation computing, the role of cloud, internet and smart devices will be capacious. Nowadays we all are familiar with the word smart. This word is used a number of times in our daily life. The Internet of Things (IoT) will produce remarkable different kinds of information from different resources. It can store big data in the cloud. The fog computing acts as an interface between cloud and IoT. The extension of fog in this framework works on physical things under IoT. The IoT devices are called fog nodes, they can have accessed anywhere within the range of the network. The blockchain is a novel approach to record the transactions in a sequence securely. Developing a new blockchains based middleware framework in the architecture of the Internet of Things is one of the critical issues of wireless networking where resolving such an issue would result in constant growth in the use and popularity of IoT. The proposed research creates a framework for providing the middleware framework in the internet of smart devices network for the internet of things using blockchains technology. Our main contribution links a new study that integrates blockchains to the Internet of things and provides communication security to the internet of smart devices.


Sign in / Sign up

Export Citation Format

Share Document