internet of things environment
Recently Published Documents


TOTAL DOCUMENTS

0
(FIVE YEARS 114)

H-INDEX

0
(FIVE YEARS 0)

2022 ◽  
Vol 2022 ◽  
pp. 1-13
Author(s):  
Congcong Tang ◽  
Lei Zhao

Public art planning and design in the context of smart cities need to keep pace with the times, but the integrity of the original scene needs to be maintained in the process of public art design. Therefore, this paper combines the elements of the scene and integrates the Internet of Things smart city to conduct public art planning and design research. Moreover, based on the multimedia Internet of Things environment, this paper analyzes the effects of virtual reality technology in urban public art planning and design and gives the overall optimization ideas for the organization and rendering of VR scene data. Then, this paper studies the organization and rendering optimization methods of the terrain scene model and the scene model, respectively. The experimental research results show that the smart city public art planning and design system under the multimedia Internet of Things environment designed in this paper has a good smart city public art planning and design effect.


Author(s):  
Norliza Katuk ◽  
Ikenna Rene Chiadighikaobi

Many previous studies had proven that The PRESENT algorithm is ultra-lightweight encryption. Therefore, it is suitable for use in an IoT environment. However, the main problem with block encryption algorithms like PRESENT is that it causes attackers to break the encryption key. In the context of a fingerprint template, it contains a header and many zero blocks that lead to a pattern and make it easier for attackers to obtain an encryption key. Thus, this research proposed header and zero blocks bypass method during the block pre-processing to overcome this problem. First, the original PRESENT algorithm was enhanced by incorporating the block pre-processing phase. Then, the algorithm’s performance was tested using three measures: time, memory usage, and CPU usage for encrypting and decrypting fingerprint templates. This study demonstrated that the proposed method encrypted and decrypted the fingerprint templates faster with the same CPU usage of the original algorithm but consumed higher memory. Thus, it has the potential to be used in IoT environments for security.


2021 ◽  
Vol 7 ◽  
pp. e762
Author(s):  
Soukaina Bouarourou ◽  
Abdelhak Boulaalam ◽  
El Habib Nfaoui

The Internet of Things (IoT) is a paradigm that can connect an enormous number of intelligent objects, share large amounts of data, and produce new services. However, it is a challenge to select the proper sensors for a given request due to the number of devices in use, the available resources, the restrictions on resource utilization, the nature of IoT networks, and the number of similar services. Previous studies have suggested how to best address this challenge, but suffer from low accuracy and high execution times. We propose a new distributed model to efficiently deal with heterogeneous sensors and select accurate ones in a dynamic IoT environment. The model’s server uses and manages multiple gateways to respond to the request requirements. First, sensors were grouped into three semantic categories and several semantic sensor network types in order to define the space of interest. Second, each type’s sensors were clustered using the Whale-based Sensor Clustering (WhaleCLUST) algorithm according to the context properties. Finally, the Technique for Order of Preference by Similarity to Ideal Solution (TOPSIS) was improved to search and select the most adequate sensor matching users’ requirements. Experimental results from real data sets demonstrate that our proposal outperforms state-of-the-art approaches in terms of accuracy (96%), execution time, quality of clustering, and scalability of clustering.


2021 ◽  
Vol 21 (2) ◽  
pp. 13-16
Author(s):  
Rastislav PETIJA ◽  
◽  
František JAKAB ◽  
Peter FECIĽAK ◽  
Miroslav MICHALKO

This article deals with the implementation and experimental verification of the suitability of the TinyIPFIX protocol for data transmission in the Internet of Things environment. The work was devoted to the creation of three main components, namely TinyIPFIX exporter, collector, and mediator. The implementation of these tools made it possible to extend the possibility of monitoring a common network with an IoT environment. The experiments confirmed the success of the implementation of the protocol based on standards and pointed out the suitability of the implementation of the TinyIPFIX protocol mainly due to its optimized processes, which save up to 72% of bandwidth consumption compared to the IPFIX protocol when transmitting one data unit. Thanks to the modular approach during implementation, it is possible to deploy the protocol in the environment regardless of the transport technology. The created solution can therefore also be used in UAV sensor networks.


Electronics ◽  
2021 ◽  
Vol 10 (17) ◽  
pp. 2175
Author(s):  
Muhammad Hafidh Firmansyah ◽  
Joong-Hwa Jung ◽  
Seok-Joo Koh

With the growth of Internet of Things (IoT) services and applications, the efficient transmission of IoT data has been crucially required. The IETF has recently developed the QUIC protocol for UDP-based multiplexed and secure transport. The Multipath QUIC (MP-QUIC) is also being discussed as an extension of QUIC in the multipath network environment. In this paper, we propose a proxy-based adaptive MP-QUIC transmission for throughput enhancement in the IoT environment. In the proposed scheme, a proxy device is employed between IoT clients and IoT server to aggregate the traffics of many clients in the access network. The proxy will transport a large among of traffics to the server, adaptively to the network conditions, by using multiple paths in the backbone network. For this purpose, the proxy device employs a path manager to monitor the current network conditions and a connection manager to manage the MP-QUIC connections with the IoT server over the backbone network with multiple paths. For effective MP-QUIC transmission, the proxy will transmit the prioritized packets to the server using the best path with the lowest round-trip time (RTT), whereas the non-prioritized packets are delivered over the other paths for traffic load balancing in the network. From the testbed experimentations with the MP-QUIC implementation and ns-3 simulation modules, we see that the proposed scheme can outperform the normal QUIC (using a single path) and the existing MP-QUIC scheme (using the round-robin policy) in terms of response delay and total transmission delay. Such performance gaps tend to increase as the link delays and packet loss rates get larger in the network.


2021 ◽  
Vol 94 ◽  
pp. 107298
Author(s):  
Arijit Karati ◽  
Ruhul Amin ◽  
Prerna Mohit ◽  
Venkatasamy Sureshkumar ◽  
G.P. Biswas

Sign in / Sign up

Export Citation Format

Share Document