To see the other types of publications on this topic, follow the link: Internet of things service provider.

Journal articles on the topic 'Internet of things service provider'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Internet of things service provider.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Tiwari, Ashish, and Rajeev Mohan Sharma. "Realm Towards Service Optimization in Fog Computing." International Journal of Fog Computing 2, no. 2 (2019): 13–43. http://dx.doi.org/10.4018/ijfc.2019070102.

Full text
Abstract:
Fog Computing provides resources as a service. Various providers are providing the best form of Quality of Services (QoS) which works in the principal of pay per use. Now it is important to connect the Internet of Things (IoT) services in fog computing. The strategy for choosing a service provider is assessed by which cloud provider provides what.
APA, Harvard, Vancouver, ISO, and other styles
2

Jin, Wenquan, Rongxu Xu, Sunhwan Lim, Dong-Hwan Park, Chanwon Park, and Dohyeun Kim. "Integrated Service Composition Approach Based on Transparent Access to Heterogeneous IoT Networks Using Multiple Service Providers." Mobile Information Systems 2021 (May 28, 2021): 1–19. http://dx.doi.org/10.1155/2021/5590605.

Full text
Abstract:
The Internet of Things (IoT) enables the number of connected devices to be increased rapidly based on heterogeneous technologies such as platforms, frameworks, libraries, protocols, and standard specifications. Based on the connected devices, various applications can be developed by integrating domain-specific contents using the service composition for providing improved services. The management of the information including devices, contents, and composite objects is necessary to represent the physical objects on the Internet for accessing the IoT services transparently. In this paper, we prop
APA, Harvard, Vancouver, ISO, and other styles
3

Javaid, Sabeen, Hammad Afzal, Fahim Arif, Naima Iltaf, Haider Abbas, and Waseem Iqbal. "CATSWoTS: Context Aware Trustworthy Social Web of Things System." Sensors 19, no. 14 (2019): 3076. http://dx.doi.org/10.3390/s19143076.

Full text
Abstract:
The inevitable revolution of the Internet of Things (IoT) and its benefits can be witnessed everywhere. Two major issues related to IoT are the interoperability and the identification of trustworthy things. The proposed Context-Aware Trustworthy Social Web of Things System (CATSWoTS) addresses the interoperability issue by incorporating web technologies including Service Oriented Architecture where each thing plays the role of a service provider as well as a role of service consumer. The aspect of social web helps in getting recommendations from social relations. It was identified that the con
APA, Harvard, Vancouver, ISO, and other styles
4

Falah, Muhammad Fajrul, Yohanes Yohanie Fridelin Panduman, Sritrusta Sukaridhoto, et al. "Comparison of cloud computing providers for development of big data and internet of things application." Indonesian Journal of Electrical Engineering and Computer Science 22, no. 3 (2021): 1723. http://dx.doi.org/10.11591/ijeecs.v22.i3.pp1723-1730.

Full text
Abstract:
The improved technology of big data and the internet of things (IoT) increases the number of developments in the application of smart city and Industry 4.0. Thus, the need for high-performance cloud computing is increasing. However, the increase in cloud computing service providers causes difficulties in determining the chosen service provider. Therefore, the purpose of this study is to make comparisons to determine the criteria for selecting cloud computing services following the system architecture and services needed to develop IoT and big data applications. We have analyzed several paramet
APA, Harvard, Vancouver, ISO, and other styles
5

Sadiku, Matthew N. O., Mahamadou Tembely, and Sarhan M. Musa. "Internet of Services." International Journal of Advanced Research in Computer Science and Software Engineering 8, no. 5 (2018): 91. http://dx.doi.org/10.23956/ijarcsse.v8i5.678.

Full text
Abstract:
The Internet of Things could be a short-lived phrase since it will soon become the Internet of Services (IoS). IoS is a major pillar of the future Internet because it presents everything on the Internet as a service. The Internet of Things (IoT) will become the enabler of IoS as we move into the service era. Different hardware configurations will enable different kind of services. This paper provides a brief introduction into the Internet of Service.
APA, Harvard, Vancouver, ISO, and other styles
6

Xiao, Zheng Rong, Bang Guo Lv, Xin Wang, and You Jun Zhao. "A Healthcare Service System Based on Internet of Things." Advanced Materials Research 774-776 (September 2013): 1903–7. http://dx.doi.org/10.4028/www.scientific.net/amr.774-776.1903.

Full text
Abstract:
With the development of networking technology and cloud computing technology, low-cost, high level of general practitioners of public health services and basic health service support, as well as the effective supervision of the centralized management and control of public health and primary health care can be achieved. A health cloud service system based on Internet of Things is provided, which is divided into six modules. The system can be used to subordinate all hospitals and medical institutions to provide hospital management and health of residents file management application services usin
APA, Harvard, Vancouver, ISO, and other styles
7

Sahu, Deblu, Bikash Pradhan, Anwesha Khasnobish, Sarika Verma, Doman Kim, and Kunal Pal. "The Internet of Things in Geriatric Healthcare." Journal of Healthcare Engineering 2021 (July 17, 2021): 1–16. http://dx.doi.org/10.1155/2021/6611366.

Full text
Abstract:
There is a significant increase in the geriatric population across the globe. With the increase in the number of geriatric people and their associated health issues, the need for larger healthcare resources is inevitable. Because of this, healthcare service-providing industries are facing a severe challenge. However, technological advancement in recent years has enabled researchers to develop intelligent devices to deal with the scarcity of healthcare resources. In this regard, the Internet of things (IoT) technology has been a boon for healthcare services industries. It not only allows the mo
APA, Harvard, Vancouver, ISO, and other styles
8

Xu, De Gang, Lei Hua Qin, and Jing Li Zhou. "Internet of Things: Security-Based Application Level Lookup Protocol." Applied Mechanics and Materials 411-414 (September 2013): 625–28. http://dx.doi.org/10.4028/www.scientific.net/amm.411-414.625.

Full text
Abstract:
In the emerging Internet of Things (IOT), lookup service or discovery service plays a critical role, however, current lookup services and discovery services of IoT have not been widely adopted due to some drawbacks or bottlenecks, as well as the item-level lookup service is still missing, moreover, enhancing security and privacy protection does not get enough attention. Therefore, based on the object discovery service architecture (ODSA) a distributed serial number level object discovery service architecture using Chord for the IOT, a security-based application level lookup protocol was provid
APA, Harvard, Vancouver, ISO, and other styles
9

Liang, Xiaoqi, Yonghui Dai, Hanjian Chen, and Shengqi Lu. "Construction of emotional intelligent service system for the aged based on Internet of things." Advances in Mechanical Engineering 11, no. 3 (2019): 168781401983379. http://dx.doi.org/10.1177/1687814019833799.

Full text
Abstract:
With the acceleration of global aging, the service of the aged has been widely concerned by the whole society. The traditional service mode has been challenged, and it is difficult to meet the needs of the aged. In order to provide better services for the aged, the construction of emotional intelligent service based on Internet of things is proposed in this article. First, the framework is introduced, and the architecture of the whole system is given. Second, the key technologies of emotional intelligence and Internet of things are described, which mainly include affective computing and data c
APA, Harvard, Vancouver, ISO, and other styles
10

Kim, Mihui, and Junhyeok Yun. "Development of User-Participatory Crowdsensing System for Improved Privacy Preservation." Future Internet 12, no. 3 (2020): 56. http://dx.doi.org/10.3390/fi12030056.

Full text
Abstract:
Recently, crowdsensing, which can provide various sensing services using consumer mobile devices, is attracting considerable attention. The success of these services depends on active user participation and, thus, a proper incentive mechanism is essential. However, if the sensing information provided by a user includes personal information, and an attacker compromises the service provider, participation will be less active. Accordingly, personal information protection is an important element in crowdsensing services. In this study, we resolve this problem by separating the steps of sensing dat
APA, Harvard, Vancouver, ISO, and other styles
11

Park, Soochang. "D-PARK: User-Centric Smart Parking System over BLE-Beacon Based Internet of Things." Electronics 10, no. 5 (2021): 541. http://dx.doi.org/10.3390/electronics10050541.

Full text
Abstract:
Our daily life services are quickly becoming smarter with intelligence and information through artificial intelligence (AI) and Big Data technologies. Parking services are one of the most frequently used in our daily life-cycle. This parking application could be classified into several features according to demands and properties, such as parking capacity balancing on a city-level view, parking fee maximization for achieving the service provider demand, empty parking spot notification within a parking lot, etc. This paper concentrates on parking space detection and alert to users. Most smart s
APA, Harvard, Vancouver, ISO, and other styles
12

Jin, Wenquan, Rongxu Xu, Sunhwan Lim, Dong-Hwan Park, Chanwon Park, and Dohyeun Kim. "Dynamic Inference Approach Based on Rules Engine in Intelligent Edge Computing for Building Environment Control." Sensors 21, no. 2 (2021): 630. http://dx.doi.org/10.3390/s21020630.

Full text
Abstract:
Computation offloading enables intensive computational tasks in edge computing to be separated into multiple computing resources of the server to overcome hardware limitations. Deep learning derives the inference approach based on the learning approach with a volume of data using a sufficient computing resource. However, deploying the domain-specific inference approaches to edge computing provides intelligent services close to the edge of the networks. In this paper, we propose intelligent edge computing by providing a dynamic inference approach for building environment control. The dynamic in
APA, Harvard, Vancouver, ISO, and other styles
13

Бізнес-моделі інтернету речей, Larysa, and Yurii Daynovskyy. "Business models of the Internet of Things." Marketing and Digital Technologies 4, no. 4 (2020): 14–51. http://dx.doi.org/10.15276/mdt.4.4.2020.2.

Full text
Abstract:
Aim of the article. The Internet of Things (IoT) is an integral part of the modern Internet. Numerous publications concerning IoT business models (BM) mainly focus on an analysis of the specificity acquired by components of traditional BM templates when used in IoT. BM components, such as the value creation or revenue model, are declared to be IOT business models in general, what leads to a huge number of proposed BM variants actually being just the ways of implementing certain BM components; feasibility and efficiency of combining different realizations of BM components is not investigated. T
APA, Harvard, Vancouver, ISO, and other styles
14

Utami Handayani, Naniek, Agus Tri Wibowo, and Diana Puspita Sari. "Assesing the Electronic Service Quality using E-S-Qual and Importance Performance Analysis Combined Method." SHS Web of Conferences 49 (2018): 01014. http://dx.doi.org/10.1051/shsconf/20184901014.

Full text
Abstract:
Internet is an integral part of any service provider activity which serve millions of users with variety of needs throughout the world. The function of internet is widely used and adapted by companies providing services in the form of business transactions, electronically or by means of e - commerce. The quality of service provided is vital to each company’s success. This case study was conducted in one of the biggest companies engaged in Indonesia’s online shopping business: LAZADA. Assessing the quality of electronic services provided by LAZADA using a combination of E - S - Qual and IPA met
APA, Harvard, Vancouver, ISO, and other styles
15

Haoxiang, Dr Wang. "TRUST MANAGEMENT OF COMMUNICATION ARCHITECTURES OF INTERNET OF THINGS." Journal of Trends in Computer Science and Smart Technology 2019, no. 02 (2019): 121–30. http://dx.doi.org/10.36548/jtcsst.2019.2.005.

Full text
Abstract:
The Internet of things is the basic paradigm with the cluster of techniques that ensure innovations in the service rendered in various applications. It aims to develop a seamless connection between the tangible objects around and the information network in turn to provide a well-structured servicing to its users. Though the IOT service seems to be promising, the risks still prevail in the form of privacy and the security in user acceptance in utilizing the internet of things services, and its application. This makes the trust management very important for the internet of things. So the paper p
APA, Harvard, Vancouver, ISO, and other styles
16

Hang, Lei, and Do-Hyeun Kim. "SLA-Based Sharing Economy Service with Smart Contract for Resource Integrity in the Internet of Things." Applied Sciences 9, no. 17 (2019): 3602. http://dx.doi.org/10.3390/app9173602.

Full text
Abstract:
Recently, technology startups have leveraged the potential of blockchain-based technologies to govern institutions or interpersonal trust by enforcing signed treaties among different individuals in a decentralized environment. However, it is going to be hard enough convincing that the blockchain technology could completely replace the trust among trading partners in the sharing economy as sharing services always operate in a highly dynamic environment. With the rapid expanding of the rental market, the sharing economy faces more and more severe challenges in the form of regulatory uncertainty
APA, Harvard, Vancouver, ISO, and other styles
17

Bourgeois, Jacky, and Gerd Kortuem. "Towards Responsible Design with Internet of Things Data." Proceedings of the Design Society: International Conference on Engineering Design 1, no. 1 (2019): 3421–30. http://dx.doi.org/10.1017/dsi.2019.349.

Full text
Abstract:
AbstractRecent advances in sensing and networking technologies, namely the Internet of Things (IoT), have become key enablers of data-intensive design processes. However, the recent introduction of the General Data Protection Regulation (GDPR) in Europe has raised concerns that the GDPR might hamper data- intensive design processes. In this paper, we map the challenges of enabling ethical and compliant design of product-service systems with personal IoT data. Specifically, we present a 4-year project led by EON, an international energy provider, to design innovative home energy systems that le
APA, Harvard, Vancouver, ISO, and other styles
18

Oh, Se-Ra, and Young-Gab Kim. "AFaaS: Authorization framework as a service for Internet of Things based on interoperable OAuth." International Journal of Distributed Sensor Networks 16, no. 2 (2020): 155014772090638. http://dx.doi.org/10.1177/1550147720906388.

Full text
Abstract:
Internet of Things has become a fundamental paradigm in our everyday lives. However, standards and technologies are often designed without considering interoperability, which is a critical issue for Internet of Things. Internet of Things environment requires interoperability to share resources (e.g. data and services) between heterogeneous Internet of Things domains. The open authorization (OAuth) 2.0 framework that is actively used in Internet of Things (as well as in conventional web environments) also did not focus on interoperability. In other words, the systems that implement the same OAu
APA, Harvard, Vancouver, ISO, and other styles
19

Lee, Kisong, and Howon Lee. "R2S: Radio Resource Sharing for Wireless Network Reliability in Internet of Things." Mobile Information Systems 2015 (2015): 1–7. http://dx.doi.org/10.1155/2015/473763.

Full text
Abstract:
Internet of Things is a system where people and things with unique identifiers are connected and able to interact with each other over a network without external intervention. To connect things anytime, network reliability is one of the main requirements for the Internet of Things, in which continuous service can be provided to nodes even in the event of a sudden network failure. To serve consistent quality of service for nodes in any case, we propose a radio resource sharing (R2S) method which consists of scheduling and power allocation using an optimization method. By evaluating performances
APA, Harvard, Vancouver, ISO, and other styles
20

Sim, Sungho, and Hanyong Choi. "A study on the service discovery support method in the IoT environments." International Journal of Electrical Engineering & Education 57, no. 1 (2018): 85–96. http://dx.doi.org/10.1177/0020720918813824.

Full text
Abstract:
The fourth Industrial Revolution is rapidly growing due to the development of ICT and the need for organic linkage in the industry. The Internet of Things (IoT), in which objects and objects from active relationships such as sensing, networking and mutual cooperation without human intervention is the core technology of the fourth Industrial Revolution, which can be linked to various industrial fields. As the IoT environment spreads, IoT devices are continuously increasing in various industries. IoT devices connected to the Internet are as different as each application environment. Many informa
APA, Harvard, Vancouver, ISO, and other styles
21

Zhao, Shuai, Bo Cheng, Le Yu, Shou-lu Hou, Yang Zhang, and Jun-liang Chen. "Internet of Things Service Provisioning Platform for Cross-Application Cooperation." International Journal of Web Services Research 13, no. 1 (2016): 1–22. http://dx.doi.org/10.4018/ijwsr.2016010101.

Full text
Abstract:
With the development of Internet of Things (IoT), large-scale of resources and applications atop them emerge. However, most of existing efforts are “silo” solutions, there is a tight-coupling between the device and the application. The paradigm for IoT and its corresponding infrastructure are required to move away from isolated solutions towards cooperative models. Recent works have focused on applying Service Oriented Architecture (SOA) to IoT service provisioning. Other than the traditional services of cyberspace which are oriented to a two-tuple problem domain, IoT services are faced with a
APA, Harvard, Vancouver, ISO, and other styles
22

Andersson, Per, and Lars-Gunnar Mattsson. "Service innovations enabled by the “internet of things”." IMP Journal 9, no. 1 (2015): 85–106. http://dx.doi.org/10.1108/imp-01-2015-0002.

Full text
Abstract:
Purpose – The purpose of this paper is to develop a new conceptual framework that reflects network dynamics in Internet of Things (IoT)-enabled service innovation processes. Design/methodology/approach – Based on literature on service innovations, business networks and IoT, dynamic concepts are selected. Aided by information about an evolving case “The connected vehicle”, propositions about interaction between the variables in the framework are formulated. Findings – A conceptual framework consisting of four interacting variables: overlapping, intermediating, objectification of actors and busi
APA, Harvard, Vancouver, ISO, and other styles
23

Zhu, Shu Ren. "Distributed Customer Service Management for Internet of Things." Applied Mechanics and Materials 433-435 (October 2013): 1618–24. http://dx.doi.org/10.4028/www.scientific.net/amm.433-435.1618.

Full text
Abstract:
It extends the network management mode of CSM, and offers a service-oriented management interface between customers and service providers. Extends some provider’s service management towards the customers and enables customers to monitor and control information about service-specific QoS parameters. Logical network, a hierarchical presentation of abstract network is presented; the definition, attribute, structure and computing method of the logic network is discussed. The presentation and access of CSM-MIB which is implemented using distributed objects is completed; by taking advantage of logic
APA, Harvard, Vancouver, ISO, and other styles
24

Toth, Andreas. "Internet of Things Vulnerabilities in Military Environments." Vojenské rozhledy 30, no. 3 (2021): 45–58. http://dx.doi.org/10.3849/2336-2995.30.2021.03.045-058.

Full text
Abstract:
IoT devices (sensors, drones, cameras) are gaining more and more emphasis on military operations. The application of IoT elements in the military environment increases situational awareness and supports the acquisition and maintenance of information superiority. The information they provide about the enemy, the area of operations, and the location and status of our soldiers and assets can contribute to the successful execution of operations at the tactical, operational and strategic levels. However, they can also pose serious threats if their vulnerabilities allow the data they collected to le
APA, Harvard, Vancouver, ISO, and other styles
25

Wang, Jing Pei, Sun Bin, Yang Yu, and Xin Xin Niu. "Distributed Trust Management Mechanism for the Internet of Things." Applied Mechanics and Materials 347-350 (August 2013): 2463–67. http://dx.doi.org/10.4028/www.scientific.net/amm.347-350.2463.

Full text
Abstract:
Trust management provides a potential solution for the security issues of distributed networks. However, there are rare researches about the trust mechanism for IoT in the literature. A new distributed trust management mechanism for IoT is established in this paper. Firstly, we extract three basic elements-service, decision-making and self-organizing, of trust management from the investigated trust solutions. Then, based on a service model, we establish a trust management frame-work for the layered IoT, which is decomposed into three layers: sensor layer, core layer and application layer. Fina
APA, Harvard, Vancouver, ISO, and other styles
26

Kavitha, V., Dr P. Shanmugapriya, A. S. Aisshwaryapriya, and M. Harini. "Service based collaborative framework for smart gardening." International Journal of Engineering & Technology 7, no. 3.3 (2018): 588. http://dx.doi.org/10.14419/ijet.v7i2.33.14841.

Full text
Abstract:
Service oriented architecture (SOA) is being an evolving technology, which allows various applications to talk with each other and share data and services through a provider, mediator and service requestor with a service description. This paper recommends a way for the development of “smart gardening” using web services in combination with internet of things (IoT). This approach helps to develop, deploy, integrate and manage various services through a collaborative framework for the effective maintenance of plant growth. The usage of IoT will help people to use the sophisticated techniques to
APA, Harvard, Vancouver, ISO, and other styles
27

Khan, Zulfiqar Ali, Israr Ullah, Muhammad Ibrahim, Muhammad Fayaz, Ayman Aljarbouh, and Muhammad Shuaib Qureshi. "Virtualization Based Efficient Service Matching and Discovery in Internet of Things." Electronics 9, no. 6 (2020): 1007. http://dx.doi.org/10.3390/electronics9061007.

Full text
Abstract:
Internet of Things (IoT) is getting more popular day by day, which triggers its adoption for solving domain specific problems. Cities are becoming smart by gathering the context knowledge through sensors and controlling specific parameters through actuators. Dynamically discovering and integrating different data streams from different sensors is a major challenge these days. In this paper, a service matchmaking algorithm is presented for service discovery utilizing IoT devices and services in a particular geographic area. It helps us to identify services based on a variety of parameters (locat
APA, Harvard, Vancouver, ISO, and other styles
28

Shiva Shankar, K. C., and G. T. Jagadeesha. "A Cloud Computing Perspective towards Adoption of Technological Transformation and Innovation among Higher Educational Institutions." Asian Journal of Managerial Science 8, no. 3 (2019): 39–43. http://dx.doi.org/10.51983/ajms-2019.8.3.2708.

Full text
Abstract:
In this competitive business environment, each and every service providers tries to differentiate themselves in offering their products and services according to the basic expectations of the target audiences. Wherein currently technological transformation and its adoption becomes a predominant and essential factor for the success of any service provider in the modern educational institution of the growing Indian service sector. Adoption of modern technologies in to their business offerings certainly increased their competitive advantage compared to other service providers on one hand and on t
APA, Harvard, Vancouver, ISO, and other styles
29

Zou, Yiqin, and Li Quan. "A new service-oriented grid-based method for AIoT application and implementation." Modern Physics Letters B 31, no. 19-21 (2017): 1740064. http://dx.doi.org/10.1142/s0217984917400644.

Full text
Abstract:
The traditional three-layer Internet of things (IoT) model, which includes physical perception layer, information transferring layer and service application layer, cannot express complexity and diversity in agricultural engineering area completely. It is hard to categorize, organize and manage the agricultural things with these three layers. Based on the above requirements, we propose a new service-oriented grid-based method to set up and build the agricultural IoT. Considering the heterogeneous, limitation, transparency and leveling attributes of agricultural things, we propose an abstract mo
APA, Harvard, Vancouver, ISO, and other styles
30

Qi, Jin, Zian Wang, Bin Xu, Mengfei Wu, Zian Gao, and Yanfei Sun. "QoS-Driven Adaptive Trust Service Coordination in the Industrial Internet of Things." Sensors 18, no. 8 (2018): 2449. http://dx.doi.org/10.3390/s18082449.

Full text
Abstract:
The adaptive coordination of trust services can provide highly dependable and personalized solutions for industrial requirements in the service-oriented industrial internet of things (IIoT) architecture to achieve efficient utilization of service resources. Although great progress has been made, trust service coordination still faces challenging problems such as trustless industry service, poor coordination, and quality of service (QoS) personalized demand. In this paper, we propose a QoS-driven and adaptive trust service coordination method to implement Pareto-efficient allocation of limited
APA, Harvard, Vancouver, ISO, and other styles
31

Du, Cong, Sujie Shao, Feng Qi, and Luoming Meng. "Multi-requests satisfied based on energy optimization for the service composition in wireless sensor network." International Journal of Distributed Sensor Networks 15, no. 9 (2019): 155014771987904. http://dx.doi.org/10.1177/1550147719879049.

Full text
Abstract:
Wireless sensor network based on service-oriented architecture has provided important support for Internet of Things in smart city; therefore, multi-requests can be satisfied through service composition. However, as the number and complexity of requests increase, the dynamic and low energy of sensors in wireless sensor network gradually limit the development of the service-oriented architecture in Internet of Things; therefore, optimizing energy under the condition that multi-requests can be satisfied in the dynamic wireless sensor network becomes an important problem. To address this challeng
APA, Harvard, Vancouver, ISO, and other styles
32

Li, Shancang, Theo Tryfonas, and Honglei Li. "The Internet of Things: a security point of view." Internet Research 26, no. 2 (2016): 337–59. http://dx.doi.org/10.1108/intr-07-2014-0173.

Full text
Abstract:
Purpose – The purpose of this paper is to provide an in-depth overview of the security requirements and challenges for Internet of Things (IoT) and discuss security solutions for various enabling technologies and implications to various applications. Design/methodology/approach – Security requirements and solutions are analysed based on a four-layer framework of IoT on sensing layer, network layer, service layer, and application layer. The cross-layer threats are analysed followed by the security discussion for the enabling technologies including identification and tracking technologies, WSN a
APA, Harvard, Vancouver, ISO, and other styles
33

Jin, Wenquan, and Dohyeun Kim. "Consistent Registration and Discovery Scheme for Devices and Web Service Providers Based on RAML Using Embedded RD in OCF IoT Network." Sustainability 10, no. 12 (2018): 4706. http://dx.doi.org/10.3390/su10124706.

Full text
Abstract:
The Internet of Things (IoT) is comprised of connected devices which are equipped with sensors, actuators, and applications to provide services for enabling those objects to connect and exchange data. For these connected devices and the IoT network environment, heterogeneous protocols and frameworks have been published and applied to provide novel IoT services in our daily life. On the Internet, most of the services are provided by existing web service providers which are based on the high-performance processor, storage, and stable power supply. However, devices of the IoT are developed for co
APA, Harvard, Vancouver, ISO, and other styles
34

Fan, Xuemei. "Mobile Internet of Things Dynamic Grid QoS Service Matching Mechanism and Simulation Analysis." Complexity 2021 (June 11, 2021): 1–11. http://dx.doi.org/10.1155/2021/2884700.

Full text
Abstract:
With the development of the mobile Internet of Things, people have higher and higher requirements for services, and how to provide high-quality services that meet the needs of users has also become a hot issue of current research. This article is also in the context of the mobile Internet of Things, researching the solution to the service matching problem. In order to provide high-quality grid services, the grid system needs the support of quality of service (QoS). Based on the existing QoS matching strategy, a service matching strategy based on dynamic grid QoS is proposed. This paper combine
APA, Harvard, Vancouver, ISO, and other styles
35

Abdelghaffar, Hany, and Mohamed Abousteit. "Internet of Things (IoT) Interoperability Success Criteria." International Journal of Enterprise Information Systems 17, no. 1 (2021): 85–105. http://dx.doi.org/10.4018/ijeis.2021010105.

Full text
Abstract:
To deliver more value to customers, companies are striving to offer more digital services, and the internet of things (IOT) is the main enabler to maximize such value. However, one of the major challenges companies are facing is digital service integration with other providers, where IoT platform is playing important role to achieve such integration opening door for interoperability within actors in the IoT ecosystem. There have been a little research addressing IoT platforms interoperability from business value perspective, considering technical and non-technical factors as selection criteria
APA, Harvard, Vancouver, ISO, and other styles
36

rajur, Dr K. Nagarathna. "IoT combined with Block-Chain and 5G infrastructure for its application and development : A Review." International Journal of Engineering and Computer Science 10, no. 5 (2021): 25327–2535. http://dx.doi.org/10.18535/ijecs/v10i5.4582.

Full text
Abstract:
It is a modern type of technology that empowers virtual and physical artefacts to interact and provide digitized services for each other, and includes the Internet of Things (IoT). But it has some benefits, but raises problems of single point of failure, anonymity, accountability, and data integrity due to the new structured design. Challenges like these stands in the path of the introduction of all the most interesting Internet of Things technologies. Bringing the Internet of Things through the public ledger might fix these issues. Decentralized ledger systems are comprised of blockchain as w
APA, Harvard, Vancouver, ISO, and other styles
37

Yu, Binbin, and Hongtu Li. "Anonymous authentication key agreement scheme with pairing-based cryptography for home-based multi-sensor Internet of Things." International Journal of Distributed Sensor Networks 15, no. 9 (2019): 155014771987937. http://dx.doi.org/10.1177/1550147719879379.

Full text
Abstract:
Home-based multi-sensor Internet of Things, as a typical application of Internet of Things, interconnects a variety of intelligent sensor devices and appliances to provide intelligent services to individuals in a ubiquitous way. As families become more and more intelligent, complex, and technology-dependent, there is less and less need for human intervention. Recently, many security attacks have shown that Internet home-based Internet of Things have become a vulnerable target, leading to personal privacy problems. For example, eavesdroppers can acquire the identity of specific devices or senso
APA, Harvard, Vancouver, ISO, and other styles
38

Mallikarjuna, Basetty. "Feedback-Based Fuzzy Resource Management in IoT-Based-Cloud." International Journal of Fog Computing 3, no. 1 (2020): 1–21. http://dx.doi.org/10.4018/ijfc.2020010101.

Full text
Abstract:
The main aim of Internet of Things (IoT) is to get every “thing” (sensors, smart cameras, wearable devices, and smart home appliances) to connect to the internet. Henceforth to produce the high volume of data required for data processing between IoT devices, large storage and the huge number of applications to offer cloud computing as a service. The purpose of IoT-based-cloud is to manage the resources, and effective utilization of tasks in cloud. The end user applications are essential to enhance the QoS parameters. As per the QoS parameters, the service provider makes the speed up of tasks.
APA, Harvard, Vancouver, ISO, and other styles
39

Taherizadeh, Salman, Vlado Stankovski, and Marko Grobelnik. "A Capillary Computing Architecture for Dynamic Internet of Things: Orchestration of Microservices from Edge Devices to Fog and Cloud Providers." Sensors 18, no. 9 (2018): 2938. http://dx.doi.org/10.3390/s18092938.

Full text
Abstract:
The adoption of advanced Internet of Things (IoT) technologies has impressively improved in recent years by placing such services at the extreme Edge of the network. There are, however, specific Quality of Service (QoS) trade-offs that must be considered, particularly in situations when workloads vary over time or when IoT devices are dynamically changing their geographic position. This article proposes an innovative capillary computing architecture, which benefits from mainstream Fog and Cloud computing approaches and relies on a set of new services, including an Edge/Fog/Cloud Monitoring Sys
APA, Harvard, Vancouver, ISO, and other styles
40

Chen, Liang, Yang Wang, Shi Wang Yang, Xue Ping Gu, and Yan Xu. "The Real-Time Interactive Smart Energy System Based on the Internet of Things and Cloud Computing." Advanced Materials Research 705 (June 2013): 584–89. http://dx.doi.org/10.4028/www.scientific.net/amr.705.584.

Full text
Abstract:
A real-time interactive smart energy system is designed based on the internet of things and cloud computing, which is composed of Smart Meters, Smart Terminals, Smart Power Plugs and Cloud computing service system. Combining with Smart Gird property and the internet of things technology, the smart energy system provides the full range interaction of Power companies-Internet of things equipments-cooperation between the equipments. Meanwhile, the offline decision mode is supported by the expert system and the online decision mode is provided by the Cloud computing service system, making it both
APA, Harvard, Vancouver, ISO, and other styles
41

Wu, Qi Wu, and Ling Zhi Jiang. "A Flexible Security Architecture for the Internet of Things." Applied Mechanics and Materials 241-244 (December 2012): 3255–59. http://dx.doi.org/10.4028/www.scientific.net/amm.241-244.3255.

Full text
Abstract:
Security architecture is the key problem of each network construction, Internet of things (IoT) is no exception. Firstly, existing research results in relation to security architecture of IoT are summarized. Then, on the basis of the analysis of the IoT security problem, this paper discusses the network security service requirements of IoT. Finally, a novel hierarchical and flexible secure architecture for IoT is proposed, which includes the security perception layer, security network layer and security application layer. Meanwhile, it involves security services entity and security management
APA, Harvard, Vancouver, ISO, and other styles
42

Wenceslaus Ritte, James. "Security Concerns in Internet of Things." International Journal for Research in Applied Science and Engineering Technology 9, no. VII (2021): 2898–901. http://dx.doi.org/10.22214/ijraset.2021.36977.

Full text
Abstract:
Security Concerns is the among of the significant challenges of Internet of thing (IoT). Lack of proper Device updates, lack of User awareness, Software compatibility issues, service disruption, inability to monitor their current status and software are Among the challenges that IoT is facing. In this work we are going to explore significant areas of IoT applications and security measures and identify management of Machine to Machine(M2M), Platform selection criteria, Knowledge of How data is managed on various IoT applications which includes (i) IoT in healthcare (ii) Blood Banks. In this wor
APA, Harvard, Vancouver, ISO, and other styles
43

Daghmehchi Firoozjaei, Mahdi, Ali Ghorbani, Hyoungshick Kim, and JaeSeung Song. "Hy-Bridge: A Hybrid Blockchain for Privacy-Preserving and Trustful Energy Transactions in Internet-of-Things Platforms." Sensors 20, no. 3 (2020): 928. http://dx.doi.org/10.3390/s20030928.

Full text
Abstract:
In the current centralized IoT ecosystems, all financial transactions are routed through IoT platform providers. The security and privacy issues are inevitable with an untrusted or compromised IoT platform provider. To address these issues, we propose Hy-Bridge, a hybrid blockchain-based billing and charging framework. In Hy-Bridge, the IoT platform provider plays no proxy role, and IoT users can securely and efficiently share a credit with other users. The trustful end-to-end functionality of blockchain helps us to provide accountability and reliability features in IoT transactions. Furthermo
APA, Harvard, Vancouver, ISO, and other styles
44

Turunen, Taija, Ville Eloranta, and Esko Hakanen. "Contemporary perspectives on the strategic role of information in internet of things-driven industrial services." Journal of Business & Industrial Marketing 33, no. 6 (2018): 837–45. http://dx.doi.org/10.1108/jbim-06-2017-0153.

Full text
Abstract:
Purpose This paper aims to analyze the debate related to the strategic role of information in the industrial service business, that is, whether information is a resource that could and should be protected. The connection between manufacturers’ servitization and management strategy literature is used in the analysis. Design/methodology/approach A qualitative case study on five new entrants to the industrial service market. Findings The results of the study provide new insights on both the characteristics and boundary conditions of new entrants’ approaches to strategically benefitting from infor
APA, Harvard, Vancouver, ISO, and other styles
45

Caminha, Jean, Angelo Perkusich, and Mirko Perkusich. "A Smart Trust Management Method to Detect On-Off Attacks in the Internet of Things." Security and Communication Networks 2018 (2018): 1–10. http://dx.doi.org/10.1155/2018/6063456.

Full text
Abstract:
Internet of Things (IoT) resources cooperate with themselves for requesting and providing services. In heterogeneous and complex environments, those resources must trust each other. On-Off attacks threaten the IoT trust security through nodes performing good and bad behaviors randomly, to avoid being rated as a menace. Some countermeasures demand prior levels of trust knowledge and time to classify a node behavior. In some cases, a malfunctioning node can be mismatched as an attacker. In this paper, we introduce a smart trust management method, based on machine learning and an elastic slide wi
APA, Harvard, Vancouver, ISO, and other styles
46

Wang, Ying. "The Construction of the Psychological Health Education Platform Based on Internet of Things." Applied Mechanics and Materials 556-562 (May 2014): 6711–15. http://dx.doi.org/10.4028/www.scientific.net/amm.556-562.6711.

Full text
Abstract:
The psychological health education in school education , especially for university education has a more important significance. Most current colleges and universities have tried to build psychological health education service platform which are integrated a variety of psychological health education information and functionality using IT information based on Internet. They enrich the university psychological health education model, and achieve certain results. But these platforms, because of its own technical limitations , are generally lack of wisdom sensing, intelligent diagnosis and adaptive
APA, Harvard, Vancouver, ISO, and other styles
47

Dr. S. Smys, Dr. Abul Basar, and Dr. Haoxiang Wang. "Hybrid Intrusion Detection System for Internet of Things (IoT)." December 2020 2, no. 4 (2020): 190–99. http://dx.doi.org/10.36548/jismac.2020.4.002.

Full text
Abstract:
Internet of things (IoT) is a promising solution to connect and access every device through internet. Every day the device count increases with large diversity in shape, size, usage and complexity. Since IoT drive the world and changes people lives with its wide range of services and applications. However, IoT provides numerous services through applications, it faces severe security issues and vulnerable to attacks such as sinkhole attack, eaves dropping, denial of service attacks, etc., Intrusion detection system is used to detect such attacks when the network security is breached. This resea
APA, Harvard, Vancouver, ISO, and other styles
48

Wang, JunPing, Qiliang Zhu, and Yan Ma. "An agent-based hybrid service delivery for coordinating internet of things and 3rd party service providers." Journal of Network and Computer Applications 36, no. 6 (2013): 1684–95. http://dx.doi.org/10.1016/j.jnca.2013.04.014.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Kamola, Mariusz. "Internet of Things with Lightweight Identities Implemented Using DNS DANE—Architecture Proposal." Sensors 18, no. 8 (2018): 2517. http://dx.doi.org/10.3390/s18082517.

Full text
Abstract:
Domain Name Service (DNS) and its certification related resource records are appealing alternative to the standard X.509 certification framework, in provision of identities for Internet of Things (IoT) smart devices. We propose to also use DNS to store device owner identification data in device certificates. A working demonstration software has been developed as proof of this concept, which uses an external identity provider run by national authorities. As a result, smart devices are equipped with certificates that safely identify both the device and its owner. Hardware requirements make such
APA, Harvard, Vancouver, ISO, and other styles
50

Pecorella, Tommaso, Laura Pierucci, and Francesca Nizzi. "“Network Sentiment” Framework to Improve Security and Privacy for Smart Home." Future Internet 10, no. 12 (2018): 125. http://dx.doi.org/10.3390/fi10120125.

Full text
Abstract:
A Smart Home is characterized by the presence of a huge number of small, low power devices, along with more classical devices. According to the Internet of Things (IoT) paradigm, all of them are expected to be always connected to the Internet in order to provide enhanced services. In this scenario, an attacker can undermine both the network security and the user’s security/privacy. Traditional security measures are not sufficient, because they are too difficult to setup and are either too weak to effectively protect the user or too limiting for the new services effectiveness. The paper suggest
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!