Статті в журналах з теми "IoT Architecture"

Щоб переглянути інші типи публікацій з цієї теми, перейдіть за посиланням: IoT Architecture.

Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями

Оберіть тип джерела:

Ознайомтеся з топ-50 статей у журналах для дослідження на тему "IoT Architecture".

Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.

Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.

Переглядайте статті в журналах для різних дисциплін та оформлюйте правильно вашу бібліографію.

1

Aguru, Aswani Devi, Erukala Suresh Babu, Soumya Ranjan Nayak, Abhisek Sethy, and Amit Verma. "Integrated Industrial Reference Architecture for Smart Healthcare in Internet of Things: A Systematic Investigation." Algorithms 15, no. 9 (August 29, 2022): 309. http://dx.doi.org/10.3390/a15090309.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Internet of Things (IoT) is one of the efflorescing technologies of recent years with splendid real-time applications in the fields of healthcare, agriculture, transportation, industry, and environmental monitoring. In addition to the dominant applications and services of IoT, many challenges exist. As there is a lack of standardization for IoT technologies, the architecture emerged as the foremost challenge. The salient issues in designing an IoT architecture encompass connectivity, data handling, heterogeneity, privacy, scalability, and security. The standard IoT architectures are the ETSI IoT Standard, the ITU-T IoT Reference Model, IoT-A Reference Model, Intel’s IoT Architecture, the Three-Layer Architecture, Middle-Based Architecture, Service-Oriented Architecture, Five-Layer Architecture, and IWF Architecture. In this paper, we have reviewed these architectures and concluded that IWF Architecture is most suitable for the effortless development of IoT applications because of its immediacy and depth of insight in dealing with IoT data. We carried out this review concerning smart healthcare as it is among the major industries that have been leaders and forerunners in IoT technologies. Motivated by this, we designed the novel Smart Healthcare Reference Architecture (SHRA) based on IWF Architecture. Finally, present the significance of smart healthcare during the COVID-19 pandemic. We have synthesized our findings in a systematic way for addressing the research questions on IoT challenges. To the best of our knowledge, our paper is the first to provide an exhaustive investigation on IoT architectural challenges with a use case in a smart healthcare system.
2

Zhang, Yongqiang, Hongchang Yu, Wanzhen Zhou, and Menghua Man. "Application and Research of IoT Architecture for End-Net-Cloud Edge Computing." Electronics 12, no. 1 (December 20, 2022): 1. http://dx.doi.org/10.3390/electronics12010001.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
At the edge of the network close to the source of the data, edge computing deploys computing, storage and other capabilities to provide intelligent services in close proximity and offers low bandwidth consumption, low latency and high security. It satisfies the requirements of transmission bandwidth, real-time and security for Internet of Things (IoT) application scenarios. Based on the IoT architecture, an IoT edge computing (EC-IoT) reference architecture is proposed, which contained three layers: The end edge, the network edge and the cloud edge. Furthermore, the key technologies of the application of artificial intelligence (AI) technology in the EC-IoT reference architecture is analyzed. Platforms for different EC-IoT reference architecture edge locations are classified by comparing IoT edge computing platforms. On the basis of EC-IoT reference architecture, an industrial Internet of Things (IIoT) edge computing solution, an Internet of Vehicles (IoV) edge computing architecture and a reference architecture of the IoT edge gateway-based smart home are proposed. Finally, the trends and challenges of EC-IoT are examined, and the EC-IoT architecture will have very promising applications.
3

Vishwakarma, Niraj Kumar, Rohit Kumar Singh, and R. R. K. Sharma. "Internet of things architectures: do organizational strategies matters?" Business Process Management Journal 26, no. 1 (June 12, 2019): 102–31. http://dx.doi.org/10.1108/bpmj-03-2018-0092.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Purpose The technology used by an organization is significantly influenced by the organization’s preferred competitive capabilities. The Internet of things (IoT) is an important technology, which is implemented by most prominent business organizations. The purpose of this paper is to investigate the relationship between an organization’s strategies and the IoT architectures implemented by the organization. Design/methodology/approach This study has been carried out on primary data collected with the help of a structured questionnaire. The data have been analyzed by statistical techniques like cluster analysis and discriminant analysis through SPSS. Findings The empirical investigation of data revealed that there is a relationship between organizational strategy and IoT architectures. The three-layered architecture of the IoT is most suitable for caretakers; the three-, four- or five- layered architectures are suitable for marketeers; whereas innovators find it more suitable to use five- or more-layered architecture of the IoT. This paper draws the conclusion based on maximum likelihood rather than using statistical analyses like ANOVA. The idea behind using the maximum likelihood estimate is that there are many subjective parameters in deciding the architectures of the IoT. These subjective parameters are difficult to quantify, so it is not possible to apply ANOVA on these parameters. Research limitations/implications This study considers three organizational strategies; the relationship between other organizational strategies and IoT architecture will be studied in future. Practical implications This study offers multiple opportunities to practitioners and consulting firms of the IoT to adopt a suitable IoT architecture according to the organizational strategy. This study equips IoT development engineers to select suitable technology for data capturing, data transmission, and data management and access for an IoT architecture. Originality/value Although a lot of work has already been done on the architecture of IoT for different industries and businesses, to the best of our knowledge, this is the first study that relates organizational strategies to IoT architectures. This study applies to all the major industry types.
4

Ejike, Christian Nonyelum, Tebella Mathaba, and Francois Du Rand. "General-Purpose Architectural Model for IoT-Based In-situ Monitoring Systems." MATEC Web of Conferences 370 (2022): 05006. http://dx.doi.org/10.1051/matecconf/202237005006.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Over time, the Internet of things (IoT) discussion has come to prominence, and in-situ monitoring systems have been geared up with IoT services and deployed over IoT architectures. The integration of IoT services within system development has enriched many monitoring application studies but the architectural models used in majority of these studies trivializes several key components of a fully functional IoT architecture. This paper proposes a general-purpose architectural model (GPAM) that can be used in the deployment of any in-situ monitoring system. The proposed architectural model is successfully implemented using a single domain use-case (water assessment) as a conceptual proof. The traditional water assessment processes are transformed into IoT processes in an attempt to reach the same result in a more efficient manner. This template can help prospective developers build and engineer robust IoT monitoring systems.
5

Aldea, Constantin Lucian, Razvan Bocu, and Anca Vasilescu. "Relevant Cybersecurity Aspects of IoT Microservices Architectures Deployed over Next-Generation Mobile Networks." Sensors 23, no. 1 (December 24, 2022): 189. http://dx.doi.org/10.3390/s23010189.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
The design and implementation of secure IoT platforms and software solutions represent both a required functional feature and a performance acceptance factor nowadays. This paper describes relevant cybersecurity problems considered during the proposed microservices architecture development. Service composition mechanisms and their security are affected by the underlying hardware components and networks. The overall speedup of the platforms, which are implemented using the new 5G networks, and the capabilities of new performant IoT devices may be wasted by an inadequate combination of authentication services and security mechanisms, by the architectural misplacing of the encryption services, or by the inappropriate subsystems scaling. Considering the emerging microservices platforms, the Spring Boot alternative is used to implement data generation services, IoT sensor reading services, IoT actuators control services, and authentication services, and ultimately assemble them into a secure microservices architecture. Furthermore, considering the designed architecture, relevant security aspects related to the medical and energy domains are analyzed and discussed. Based on the proposed architectural concept, it is shown that well-designed and orchestrated architectures that consider the proper security aspects and their functional influence can lead to stable and secure implementations of the end user’s software platforms.
6

R, Jithin, and Priya Chandran. "Secure and Dynamic Memory Management Architecture for Virtualization Technologies in IoT Devices." Future Internet 10, no. 12 (November 30, 2018): 119. http://dx.doi.org/10.3390/fi10120119.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
The introduction of the internet in embedded devices led to a new era of technology—the Internet of Things (IoT) era. The IoT technology-enabled device market is growing faster by the day, due to its complete acceptance in diverse areas such as domicile systems, the automobile industry, and beyond. The introduction of internet connectivity in objects that are frequently used in daily life raises the question of security—how secure is the information and the infrastructure handled by these devices when they are connected to the internet? Security enhancements through standard cryptographic techniques are not suitable due to the power and performance constraints of IoT devices. The introduction of virtualization technology into IoT devices is a recent development, meant for fulfilling security and performance needs. However, virtualization augments the vulnerability present in IoT devices, due to the addition of one more software layer—namely, the hypervisor, which enables the sharing of resources among different users. This article proposes the adaptation of ASMI (Architectural Support for Memory Isolation—a general architecture available in the literature for the improvement of the performance and security of virtualization technology) on the popular MIPS (Microprocessor without Interlocked Pipeline Stages) embedded virtualization platform, which could be adopted in embedded virtualization architectures for IoT devices. The article illustrates the performance enhancement achieved by the proposed architecture with the existing architectures.
7

Ungurean, Ioan, and Nicoleta Cristina Gaitan. "A Software Architecture for the Industrial Internet of Things—A Conceptual Model." Sensors 20, no. 19 (September 30, 2020): 5603. http://dx.doi.org/10.3390/s20195603.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
The Internet of Things (IoT) is an emerging concept that has revolutionized the use of new technologies in everyday life. The economic impact of IoT becoming very important, and it began to be used in the industrial environment under the name of the Industrial Internet of Things (IIoT) concept, which is a sub-domain of IoT. The IIoT changes the way industrial processes are controlled and monitored, increasing operating efficiency. This article proposes a software architecture for IIoT that has a low degree of abstraction compared to the reference architectures presented in the literature. The architecture is organized on four-layer and it integrates the latest concepts related to fog and edge computing. These concepts are activated through the use of fog/edge/gateway nodes, where the processing of data acquired from things is performed and it is the place where things interact with each other in the virtual environment. The main contributions of this paper are the proposal and description of a complete IIoT software architecture, the use of a unified address space, and the use of the computing platform based on SoC (System on Chip) with specialized co-processors in order to be able to execute in real-time certain time-critical operations specific to the industrial environment.
8

Zahoor, Saniya, and Shabir A.Sofi. "Internet of Things: A Review of Functionality, Applications, Architectures and Challenges." Journal of University of Shanghai for Science and Technology 23, no. 09 (September 25, 2021): 1216–24. http://dx.doi.org/10.51201/jusst/21/09676.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
The Internet of Things (IoT) is an emerging paradigm that embodies the vision of merging smart objects while utilizing the internet as the backbone of the communication system to establish a smart interaction among physical entities in pervasive environments. In IoT, data is generated in realtime and stored in permanent repositories. Additional data in the form of meta-data that describes things adds to the data volume and to manage this data, architecture is required. IoT finds its applicability in a plethora of applications such as transportation, smart city, smart health, smart environment, home entertainment, sports, etc. but there is no universal architecture for all IoT implementations. We have layered architectures and domain-specific architectures for different IoT applications. Besides a large number of architectures for IoT, it faces several potential challenges such as scalability, reliability, heterogeneity, etc. This paper presents an understanding of the Internet of Things in terms of its functionality, layered and domain-specific architectures, and its potential challenges.
9

Astier, Jean Y., Igor Y. Zhukov, Oleg N. Murashov, and Alexey P. Bardin. "A NEW OS ARCHITECTURE FOR IOT." Bezopasnost informacionnyh tehnology 25, no. 1 (March 2018): 19–33. http://dx.doi.org/10.26583/bit.2018.1.02.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Marah, Bockarie Daniel, Zilong Jing, Tinghuai Ma, Raeed Alsabri, Raphael Anaadumba, Abdullah Al-Dhelaan, and Mohammed Al-Dhelaan. "Smartphone Architecture for Edge-Centric IoT Analytics." Sensors 20, no. 3 (February 7, 2020): 892. http://dx.doi.org/10.3390/s20030892.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
The current baseline architectures in the field of the Internet of Things (IoT) strongly recommends the use of edge computing in the design of the solution applications instead of the traditional approach which solely uses the cloud/core for analysis and data storage. This research, therefore, focuses on formulating an edge-centric IoT architecture for smartphones which are very popular electronic devices that are capable of executing complex computational tasks at the network edge. A novel smartphone IoT architecture (SMIoT) is introduced that supports data capture and preprocessing, model (i.e., machine learning models) deployment, model evaluation and model updating tasks. Moreover, a novel model evaluation and updating scheme is provided which ensures model validation in real-time. This ensures a sustainable and reliable model at the network edge that automatically adjusts to changes in the IoT data subspace. Finally, the proposed architecture is tested and evaluated using an IoT use case.
11

Benali, Cherif, and Ramdane Maamri. "A Hybrid Architecture Based on Blockchain to Ensure Security, Privacy, and Trust in IoT." International Journal of Organizational and Collective Intelligence 12, no. 4 (October 1, 2022): 1–23. http://dx.doi.org/10.4018/ijoci.312222.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
IoT is an enormous network of interconnected devices that gather data and share it over the internet. Today, IoT suffers from malevolent behaviours and actions that aim to damage and compromise privacy and security. Moreover, these issues and the new IoT requirements are not effectively covered by current architectures. Thus, this paper is an extended work of the authors' previous paper, which suggested a new architecture adhering to the IoT needs that have evolved. It suggests a hybrid architecture that integrates our previous one with a Blockchain-based architecture, to combine their significant features. The hybrid architecture fulfils the emerged requirements of IoT and exploits the Blockchain to increase trust, security and privacy. Further, the hybrid architecture delivers a novel structure to build the policy header, which is an access control list used to regulate the local network and was inherited from the Blockchain-based architecture. The Cooja simulator is used to compare the two structures, revealing that the new structure can use 87% less storage and 83% less computing.
12

Li, Yong, and Xin Ling Gan. "Study on the Architecture and Key Technology for Internet of Things." Advanced Materials Research 710 (June 2013): 660–64. http://dx.doi.org/10.4028/www.scientific.net/amr.710.660.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
The technology of the Internet of Things (IoT) has attracted highly attention of academia,industry,and news media. There are still many open issues in the definition, internal principles, architectures and system models of the IoT. Through the analysis of current technical materials, we first analyze three basic concepts and features of the IoT. Then we introduce the architecture composed of three layers of the IoT. Furthermore we summarize the key technologies of the IoT. Finally several development proposals are suggested for the IoT.
13

Abosata, Nasr, Saba Al-Rubaye, Gokhan Inalhan, and Christos Emmanouilidis. "Internet of Things for System Integrity: A Comprehensive Survey on Security, Attacks and Countermeasures for Industrial Applications." Sensors 21, no. 11 (May 24, 2021): 3654. http://dx.doi.org/10.3390/s21113654.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
The growth of the Internet of Things (IoT) offers numerous opportunities for developing industrial applications such as smart grids, smart cities, smart manufacturers, etc. By utilising these opportunities, businesses engage in creating the Industrial Internet of Things (IIoT). IoT is vulnerable to hacks and, therefore, requires various techniques to achieve the level of security required. Furthermore, the wider implementation of IIoT causes an even greater security risk than its benefits. To provide a roadmap for researchers, this survey discusses the integrity of industrial IoT systems and highlights the existing security approaches for the most significant industrial applications. This paper mainly classifies the attacks and possible security solutions regarding IoT layers architecture. Consequently, each attack is connected to one or more layers of the architecture accompanied by a literature analysis on the various IoT security countermeasures. It further provides a critical analysis of the existing IoT/IIoT solutions based on different security mechanisms, including communications protocols, networking, cryptography and intrusion detection systems. Additionally, there is a discussion of the emerging tools and simulations used for testing and evaluating security mechanisms in IoT applications. Last, this survey outlines several other relevant research issues and challenges for IoT/IIoT security.
14

Chen, Rui, and Bing Li. "Exploration of the High-Efficiency Hardware Architecture of SM4-CCM for IoT Applications." Electronics 11, no. 6 (March 17, 2022): 935. http://dx.doi.org/10.3390/electronics11060935.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
The widespread use of the internet of things (IoT) is due to the value of the data collected by IoT devices. These IoT devices generate, process, and exchange large amounts of safety-critical or privacy-sensitive data. Before transmission, the data should be protected against information leakage and data stealing. Deploying authenticated encryption with additional data (AEAD) algorithms on IoT devices ensures data confidentiality and integrity. However, AEAD algorithms are computationally intensive, while IoT devices are resource constrained or even battery powered. Therefore, a low-cost, low-power, and high-efficiency method of implementing an AEAD algorithm into resource-constrained IoT devices is required. The SM4-CCM algorithm, introduced in RFC 8998, is selected as the AEAD algorithm to address this problem. Algorithms similar to SM4-CCM (e.g., SM4 and AES-CCM) provide many architectural design references, but it is challenging to decide which architecture is the most suitable for SM4-CCM. In order to find the most efficient SM4-CCM hardware architecture, a design space exploration method is proposed. Firstly, the SM4-CCM algorithm is divided into five layers, and three candidate architectures are provided for each layer. Secondly, 63 design schemes for SM4-CCM are constructed by combining candidate architectures from each layer. Finally, a batch number of comparisons and analyses of experimental results are used to identify the most efficient one. Under TSMC 90 nm technology, the experimental results of the identified scheme show that the throughput, power consumption, and area achieve 199.99 Mbps, 1.625 mW, and 14.6 K gates, respectively. As a proof of concept, implementing this scheme on an FPGA board is also presented.
15

Lo, Sin Kit, Chee Sun Liew, Kok Soon Tey, and Saad Mekhilef. "An Interoperable Component-Based Architecture for Data-Driven IoT System." Sensors 19, no. 20 (October 9, 2019): 4354. http://dx.doi.org/10.3390/s19204354.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
The advancement of the Internet of Things (IoT) as a solution in diverse application domains has nurtured the expansion in the number of devices and data volume. Multiple platforms and protocols have been introduced and resulted in high device ubiquity and heterogeneity. However, currently available IoT architectures face challenges to accommodate the diversity in IoT devices or services operating under different operating systems and protocols. In this paper, we propose a new IoT architecture that utilizes the component-based design approach to create and define the loosely-coupled, standalone but interoperable service components for IoT systems. Furthermore, a data-driven feedback function is included as a key feature of the proposed architecture to enable a greater degree of system automation and to reduce the dependency on mankind for data analysis and decision-making. The proposed architecture aims to tackle device interoperability, system reusability and the lack of data-driven functionality issues. Using a real-world use case on a proof-of-concept prototype, we examined the viability and usability of the proposed architecture.
16

Vijayakumaran, C., B. Muthusenthil, and B. Manickavasagam. "A reliable next generation cyber security architecture for industrial internet of things environment." International Journal of Electrical and Computer Engineering (IJECE) 10, no. 1 (February 1, 2020): 387. http://dx.doi.org/10.11591/ijece.v10i1.pp387-395.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Architectural changes are happening in the modern industries due to the adaption and the deployment of ‘Internet of Things (IoT)’ for monitoring and controlling various devices remotely from the external world. The most predominant place where the IoT technology makes the most sense is the industrial automation processes in smart industries (Industry 4.0). In this paper, a reliable ‘Next Generation Cyber Security Architecture (NCSA)’ is presented for Industrial IoT (IIoT) environment that detects and thwarts cybersecurity threats and vulnerabilities. It helps to automate the processes of exchanging real-time critical information between devices without any human intervention. It proposes an analytical framework that can be used to protect entities and network traffics involved in the IIoT wireless communication. It incorporates an automated cyber-defense authentication mechanism that detects and prevents security attacks when a network session has been established. The defense mechanism accomplishes the required level of security protection in the network by generating an identity token which is cryptographically encrypted and verified by a virtual gateway system. The proposed NCSA improves security in the IIoT environment and reduces operational management cost.
17

Alreshidi, Abdulrahman, and Aakash Ahmad. "Architecting Software for the Internet of Thing Based Systems." Future Internet 11, no. 7 (July 10, 2019): 153. http://dx.doi.org/10.3390/fi11070153.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Context—Internet of Thing (IoT) based systems support any-time/place computations by interconnecting humans, systems, services, devices, and things that enabling autonomous systems to shape-up digitized societies. Software architecture, as the blue-print of software-intensive systems, abstracts the complexities of modeling, design, development, and evolution phases of a software to engineer complex IoT driven systems effectively and efficiently. Objectives and Method—Research and development efforts are required to exploit architectural principle and practices to design and develop IoT systems to go beyond the state-of-the-art for IoTs. The objectives of this research are to empirically investigate and systematically classify the state-of-the-art on architecting IoT based software. We have used the Evidence Based Software Engineering (EBSE) method to conduct a mapping study of the existing IoT solutions by investigating 88 qualitatively selected studies. Results and Implications—The results of the mapping study highlight various research themes that exploit software architecture models to develop IoT systems. The identified research themes include, but are not limited to, cloud-based software ecosystems, software defined networking, autonomous, and adaptive software and agent-based systems that IoTs drive. The mapping study suggests that futuristic research on architecting IoT software is focused on architectural languages and patterns that support reusability, automation, and human decision support to develop and dynamically adapt IoT software. The mapping study represents a concentrated knowledge regarding architectural principle and practices to facilitate knowledge transfer—benefiting researchers and practitioners—on the role of software architecture for IoT systems.
18

Yelamarthi, Kumar, Md Sayedul Aman, and Ahmed Abdelgawad. "An Application-Driven Modular IoT Architecture." Wireless Communications and Mobile Computing 2017 (2017): 1–16. http://dx.doi.org/10.1155/2017/1350929.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Building upon the advancements in the recent years, a new paradigm in technology has emerged in Internet of Things (IoT). IoT has allowed for communication with the surrounding environment through a multitude of sensors and actuators, yet operating on limited energy. Several researchers have presented IoT architectures for respective applications, often challenged by requiring major updates for adoption to a different application. Further, this comes with several uncertainties such as type of computational device required at the edge, mode of wireless connectivity required, methods to obtain power efficiency, and not ensuring rapid deployment. This paper starts with providing a horizontal overview of each layer in IoT architecture and options for different applications. Then it presents a broad application-driven modular architecture, which can be easily customized for rapid deployment. This paper presents the diverse hardware used in several IoT layers such as sensors, embedded processors, wireless transceivers, internet gateway, and application management cloud server. Later, this paper presents implementation results for diverse applications including healthcare, structural health monitoring, agriculture, and indoor tour guide systems. It is hoped that this research will assist the potential user to easily choose IoT hardware and software as it pertains to their respective needs.
19

Patel, Kajal, and Mihir Mehta. "An Outlook Architecture." International Journal of Software Innovation 11, no. 1 (January 6, 2023): 1–20. http://dx.doi.org/10.4018/ijsi.315744.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
The internet of things (IoT) has recently received much attention due to its revolutionary potential. The internet of things facilitates data interchange in a large number of possible applications, including smart transportation, smart health, smart buildings, and so on. As a result, these application domains can be grouped to form smart life. In response to the IoT's rapid growth, cybercriminals and security professionals are racing to keep up. Billions of connected devices can exchange sensitive information with each other. As a result, securing IoT and protecting users' privacy is a huge concern. A session for communication in a network is established by authenticating and validating the device's identity and checking whether it is a legal device. The IoT technology can be used for various applications only if challenges related to IoT security can be overcome.
20

Banday, M. Tariq, Syed Suhail A. Simnani, and Sameena Shah. "Architectural standards for internet of things: standardising IoT architecture." International Journal of Forensic Engineering 4, no. 3 (2019): 196. http://dx.doi.org/10.1504/ijfe.2019.10028381.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
21

Simnani, Syed Suhail A., Sameena Shah, and M. Tariq Banday. "Architectural standards for internet of things: standardising IoT architecture." International Journal of Forensic Engineering 4, no. 3 (2019): 196. http://dx.doi.org/10.1504/ijfe.2019.106656.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
22

Beltran, V., A. F. Skarmeta, and P. M. Ruiz. "An ARM-Compliant Architecture for User Privacy in Smart Cities: SMARTIE—Quality by Design in the IoT." Wireless Communications and Mobile Computing 2017 (2017): 1–13. http://dx.doi.org/10.1155/2017/3859836.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Much has been said about the benefits that the Internet of Things (IoT) will bring to citizens’ life. Countless smart objects will be soon offering autonomous behavior in smart environments by sensing the physical world around us, collecting information about us, and taking proactive actions (many times without our consent) with the ultimate goal of improving our wellness. Without a strong guarantee on user privacy, the IoT may sound scary for many citizens. Indeed, the IoT-Architecture Reference Model (IoT-ARM) is a European effort for promoting IoT quality aspects such as security and privacy. This paper paves the way to the adoption of reference architectures by describing the application of the IoT-ARM within a European-funded project, SMARTIE. The SMARTIE architecture has been designed to empower citizens to take control of their IoT devices and privacy, while guaranteeing scalability for large deployments in smart cities.
23

Yousuf, Omerah, and Roohie Naaz Mir. "A survey on the Internet of Things security." Information & Computer Security 27, no. 2 (June 12, 2019): 292–323. http://dx.doi.org/10.1108/ics-07-2018-0084.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Purpose Internet of Things (IoT) is a challenging and promising system concept and requires new types of architectures and protocols compared to traditional networks. Security is an extremely critical issue for IoT that needs to be addressed efficiently. Heterogeneity being an inherent characteristic of IoT gives rise to many security issues that need to be addressed from the perspective of new architectures such as software defined networking, cryptographic algorithms, federated cloud and edge computing. Design/methodology/approach The paper analyzes the IoT security from three perspectives: three-layer security architecture, security issues at each layer and security countermeasures. The paper reviews the current state of the art, protocols and technologies used at each layer of security architecture. The paper focuses on various types of attacks that occur at each layer and provides the various approaches used to countermeasure such type of attacks. Findings The data exchanged between the different devices or applications in the IoT environment are quite sensitive; thus, the security aspect plays a key role and needs to be addressed efficiently. This indicates the urgent needs of developing general security policy and standards for IoT products. The efficient security architecture needs to be imposed but not at the cost of efficiency and scalability. The paper provides empirical insights about how the different security threats at each layer can be mitigated. Originality/value The paper fulfills the need of having an extensive and elaborated survey in the field of IoT security, along with suggesting the countermeasures to mitigate the threats occurring at each level of IoT protocol stack.
24

Ariza, Jairo, Camilo Mendoza, Kelly Garcés, and Nicolás Cardozo. "A Research Agenda for IOT Adaptive Architectures." Proceedings 2, no. 19 (October 17, 2018): 1229. http://dx.doi.org/10.3390/proceedings2191229.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Adaptation is very important in IOT systems, due to their continuously changing environments. Changes may come from different elements of the architecture underlying an IOT system. Existing literature pays special attention to changes in the Service layer using evolution agents or context aware approaches to manage adaptations to said changes. In this paper, we elaborate on eight challenges that developers face when building adaptive IOT systems. Such challenges take into account changes at the Services layer, but also in the Middleware and Physical layers. These challenges serve us as a research agenda to foster IOT technology. As a starting point, we design an architecture to deal with the posited challenges. Various of the architectural components are inspired on a reference architecture, and complemented by new components to manage dynamic adaptations in response to the identified challenges. Preliminary experiments provide an initial insight about the feasibility and/or impact of our adaptive architecture.
25

Khandelwal, Deversh, and Manjot Kaur Bhatia. "IOT Architecture, Challenges and Opportunities." International Journal for Research in Applied Science and Engineering Technology 10, no. 10 (October 31, 2022): 1137–40. http://dx.doi.org/10.22214/ijraset.2022.47047.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Abstract: The Internet of Things, as defined by the Internet itself, is the connection of embedded computing devices embedded differently within the existing infrastructure. According to IoT, soon our planet will contain the largest number of devices connected to the Internet. This paper is a discussion of the trending term 'Internet of Things' challenges and opportunities, as well as the formation of IoT, which describes widely used technologies such as M2M communications, cloud computing, IPv6, and RFID technologies, thus describing the use of IoT different fields. Finally, there is a brief review of all possible IoT applications
26

Brohi, Muhammad Nawaz. "Integration of IoT and Blockchain." Technium Romanian Journal of Applied Sciences and Technology 3, no. 8 (September 28, 2021): 32–41. http://dx.doi.org/10.47577/technium.v3i8.4692.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
present, we are in the world of digital revolution. Use of smartphones and internet accelerated due to the impact of the novel Covid-19 virus. The whole world started to turn digital. The industrialization of Internet of Things (IoT) enables more devices to connect and communicate which leads to many data transfer transactions. The architecture of IoT is centralized. The distributed and decentralized architecture of Blockchain can be used to provide secure and scalable transactions of IoT devices. Blockchain is a distributed ledger technology, which provides secure data transactions that cannot be tampered and altered. In this paper, we provide advantages and challenges of integrating IoT and Blockchain. We also provide different architectures and algorithms proposed by researchers to provide secure data transactions. We shall also shed light on the future research directions of integrating Blockchain and IoT.
27

Colonnese, Stefania, Mauro Biagi, Tiziana Cattai, Roberto Cusani, Fabrizio De Vico Fallani, and Gaetano Scarano. "Green Compressive Sampling Reconstruction in IoT Networks." Sensors 18, no. 8 (August 20, 2018): 2735. http://dx.doi.org/10.3390/s18082735.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
In this paper, we address the problem of green Compressed Sensing (CS) reconstruction within Internet of Things (IoT) networks, both in terms of computing architecture and reconstruction algorithms. The approach is novel since, unlike most of the literature dealing with energy efficient gathering of the CS measurements, we focus on the energy efficiency of the signal reconstruction stage given the CS measurements. As a first novel contribution, we present an analysis of the energy consumption within the IoT network under two computing architectures. In the first one, reconstruction takes place within the IoT network and the reconstructed data are encoded and transmitted out of the IoT network; in the second one, all the CS measurements are forwarded to off-network devices for reconstruction and storage, i.e., reconstruction is off-loaded. Our analysis shows that the two architectures significantly differ in terms of consumed energy, and it outlines a theoretically motivated criterion to select a green CS reconstruction computing architecture. Specifically, we present a suitable decision function to determine which architecture outperforms the other in terms of energy efficiency. The presented decision function depends on a few IoT network features, such as the network size, the sink connectivity, and other systems’ parameters. As a second novel contribution, we show how to overcome classical performance comparison of different CS reconstruction algorithms usually carried out w.r.t. the achieved accuracy. Specifically, we consider the consumed energy and analyze the energy vs. accuracy trade-off. The herein presented approach, jointly considering signal processing and IoT network issues, is a relevant contribution for designing green compressive sampling architectures in IoT networks.
28

Petrenko, Sergei. "Cyber Resilient Platform for Internet of Things (IIOT/IOT)ED Systems: Survey of Architecture Patterns." Voprosy kiberbezopasnosti, no. 2(42) (2021): 81–91. http://dx.doi.org/10.21681/2311-3456-2021-2-81-91.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Purpose of the article: development of tools for building the cyber resilient platform for Internet of things (IIoT/IoT). The urgency of development the cyber resilient platform for Internet of things (IIoT/IoT) is to provide the required security and resilience of critical information infrastructure of the Russian Federation in the face of rising security threats, and imperfection of the known models, methods and means for data collection and processing in IIoT/IoT networks, based on the wireless technology Sigfox, LoRaWaN, “Strij/”Vaviot” (XNB/Nb-Fi), NBIoT. Research methods: It uses the author’s models and methods of similarity and dimensions theory of the distributed computing, as well as the domestic technology of wireless communication Logic Inter Node Connection (LINC) (http:// aura360.ru/), as well as the domestic FenixOS operating system (https://fenix.link/kontakty/), designed for collecting and processing the telemetry data. Results: Developed tools for building the cyber resilient platform for Internet of things (IIoT/IoT). The article presents the main scientific and technical results of solving this problem. The research was carried out within the framework of the Federal project “Information security” of the national program “Digital economy of the Russian Federation”. It is important to note that the results allowed designing a prototype of the domestic Internet of things (IIoT/IoT) platform with self-healing data reception and transmission paths between smart devices
29

Park, Sang-Jun, Kyung-Tae Lee, Jin-Bin Im, and Ju-Hyung Kim. "The Need for Smart Architecture Caused by the Impact of COVID-19 upon Architecture and City: A Systematic Literature Review." Sustainability 14, no. 13 (June 28, 2022): 7900. http://dx.doi.org/10.3390/su14137900.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
The recent pandemic era of COVID-19 has shown social adjustment on a global scale in an attempt to reduce contamination. In response, academic studies relating to smart technologies have increased to assist with governmental restrictions such as social distancing. Despite the restrictions, architectural, engineering and construction industries have shown an increase in budget and activity. An investigation of the adjustments made in response to the pandemic through utilizing new technologies, such as the internet of things (IoT) and smart technologies, is necessary to understand the research trends of the new normal. This study should address various sectors, including business, healthcare, architecture, education, tourism and transportation. In this study, a literature review was performed on two web-based, peer-reviewed journal databases, SCOPUS and Web of Science, to identify a trend in research for the pandemic era in various sectors. The results from 123 papers revealed a focused word group of IoT, smart technologies, architecture, building, space and COVID-19. Overlapping knowledges of IoT systems, within the design of a building which was designed for a specific purpose, were discovered. The findings justify the need for a new sub-category within the field of architecture called “smart architecture”. This aims to categorize the knowledge which is required to embed IoT systems in three key architectural topics—planning, design, and construction—for building design with specific purposes, tailored to various sectors.
30

Dhanasekar, S., E. Ilankhatir, S. Divakar, and D. Vennila. "A Survey on IoT Architecture." International Journal of Advanced Scientific Research and Development (IJASRD) 6, no. 4 (May 10, 2019): 09. http://dx.doi.org/10.26836/ijasrd/2019/v6/i4/60402.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
31

Isikdag, U., and M. Pilouk. "INTEGRATION OF GEO-SENSOR FEEDS AND EVENT CONSUMER SERVICES FOR REAL-TIME REPRESENTATION OF IOT NODES." ISPRS - International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences XLI-B4 (June 13, 2016): 267–74. http://dx.doi.org/10.5194/isprs-archives-xli-b4-267-2016.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
More and more devices are starting to be connected to the Internet every day. Internet-of-Things (IoT) is known as an architecture where online devices have the ability to communicate and interact with each other in real-time. On the other hand, with the development of IoT related technologies information about devices (i.e. Things) can be acquired in real-time by the humans. The implementation of IoT related technologies requires new approaches to be investigated for novel system architectures. These architectures need to have 3 main abilities. The first one is the ability is to store and query information coming from millions of devices in real-time. The second one is the ability to interact with large number of devices seamlessly regardless of their hardware and their software platforms. The final one is the ability to visualise and present information coming from millions of sensors in real time. The paper provides an architectural approach and implementation tests for storage, exposition and presentation of large amounts of real-time geo-information coming from multiple IoT nodes (and sensors).
32

Isikdag, U., and M. Pilouk. "INTEGRATION OF GEO-SENSOR FEEDS AND EVENT CONSUMER SERVICES FOR REAL-TIME REPRESENTATION OF IOT NODES." ISPRS - International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences XLI-B4 (June 13, 2016): 267–74. http://dx.doi.org/10.5194/isprsarchives-xli-b4-267-2016.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
More and more devices are starting to be connected to the Internet every day. Internet-of-Things (IoT) is known as an architecture where online devices have the ability to communicate and interact with each other in real-time. On the other hand, with the development of IoT related technologies information about devices (i.e. Things) can be acquired in real-time by the humans. The implementation of IoT related technologies requires new approaches to be investigated for novel system architectures. These architectures need to have 3 main abilities. The first one is the ability is to store and query information coming from millions of devices in real-time. The second one is the ability to interact with large number of devices seamlessly regardless of their hardware and their software platforms. The final one is the ability to visualise and present information coming from millions of sensors in real time. The paper provides an architectural approach and implementation tests for storage, exposition and presentation of large amounts of real-time geo-information coming from multiple IoT nodes (and sensors).
33

Liao, Xiaoqun, Mohammad Faisal, Qing QingChang, and Amjad Ali. "Evaluating the Role of Big Data in IIOT-Industrial Internet of Things for Executing Ranks Using the Analytic Network Process Approach." Scientific Programming 2020 (October 17, 2020): 1–7. http://dx.doi.org/10.1155/2020/8859454.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Due to the enhancements of Internet of Things (IoT) and sensors deployments, the production of big data in Industrial Internet of Things (IIoT) is increased. The accessing and processing of big data become a challenging issue due to the limited storage space, computational time, networking, and IoT devices end. IoT and big data are well thought-out to be the key concepts when describing new information architecture projects. The techniques, tools, and methods that help to provide better solutions for IoT and big data can have an important role to play in the architecture of business. Different approaches are being practiced in the literature for evaluating the role of big data in IIoT. These techniques are not handling the situations when complexity of dependency arises among parameters of the alternatives. The proposed research uses the approach of Analytic Network Process (ANP) for evaluating the role of big data in IIoT. The results show that the proposed research works well for evaluating the role of big data in IIoT.
34

Mishra, Nilamadhab, Chung-Chih Lin, and Hsien-Tsung Chang. "A Cognitive Adopted Framework for IoT Big-Data Management and Knowledge Discovery Prospective." International Journal of Distributed Sensor Networks 2015 (2015): 1–12. http://dx.doi.org/10.1155/2015/718390.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
In future IoT big-data management and knowledge discovery for large scale industrial automation application, the importance of industrial internet is increasing day by day. Several diversified technologies such as IoT (Internet of Things), computational intelligence, machine type communication, big-data, and sensor technology can be incorporated together to improve the data management and knowledge discovery efficiency of large scale automation applications. So in this work, we need to propose a Cognitive Oriented IoT Big-data Framework (COIB-framework) along with implementation architecture, IoT big-data layering architecture, and data organization and knowledge exploration subsystem for effective data management and knowledge discovery that is well-suited with the large scale industrial automation applications. The discussion and analysis show that the proposed framework and architectures create a reasonable solution in implementing IoT big-data based smart industrial applications.
35

Dramé-Maigné, Sophie, Maryline Laurent, Laurent Castillo, and Hervé Ganem. "Centralized, Distributed, and Everything in between." ACM Computing Surveys 54, no. 7 (September 30, 2022): 1–34. http://dx.doi.org/10.1145/3465170.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
The Internet of Things is taking hold in our everyday life. Regrettably, the security of IoT devices is often being overlooked. Among the vast array of security issues plaguing the emerging IoT, we decide to focus on access control, as privacy, trust, and other security properties cannot be achieved without controlled access. This article classifies IoT access control solutions from the literature according to their architecture (e.g., centralized, hierarchical, federated, distributed) and examines the suitability of each one for access control purposes. Our analysis concludes that important properties such as auditability and revocation are missing from many proposals while hierarchical and federated architectures are neglected by the community. Finally, we provide an architecture-based taxonomy and future research directions: a focus on hybrid architectures, usability, flexibility, privacy, and revocation schemes in serverless authorization.
36

Abbas, Qaisar, and Abdullah Alsheddy. "Driver Fatigue Detection Systems Using Multi-Sensors, Smartphone, and Cloud-Based Computing Platforms: A Comparative Analysis." Sensors 21, no. 1 (December 24, 2020): 56. http://dx.doi.org/10.3390/s21010056.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Internet of things (IoT) cloud-based applications deliver advanced solutions for smart cities to decrease traffic accidents caused by driver fatigue while driving on the road. Environmental conditions or driver behavior can ultimately lead to serious roadside accidents. In recent years, the authors have developed many low-cost, computerized, driver fatigue detection systems (DFDs) to help drivers, by using multi-sensors, and mobile and cloud-based computing architecture. To promote safe driving, these are the most current emerging platforms that were introduced in the past. In this paper, we reviewed state-of-the-art approaches for predicting unsafe driving styles using three common IoT-based architectures. The novelty of this article is to show major differences among multi-sensors, smartphone-based, and cloud-based architectures in multimodal feature processing. We discussed all of the problems that machine learning techniques faced in recent years, particularly the deep learning (DL) model, to predict driver hypovigilance, especially in terms of these three IoT-based architectures. Moreover, we performed state-of-the-art comparisons by using driving simulators to incorporate multimodal features of the driver. We also mention online data sources in this article to test and train network architecture in the field of DFDs on public available multimodal datasets. These comparisons assist other authors to continue future research in this domain. To evaluate the performance, we mention the major problems in these three architectures to help researchers use the best IoT-based architecture for detecting DFDs in a real-time environment. Moreover, the important factors of Multi-Access Edge Computing (MEC) and 5th generation (5G) networks are analyzed in the context of deep learning architecture to improve the response time of DFD systems. Lastly, it is concluded that there is a research gap when it comes to implementing the DFD systems on MEC and 5G technologies by using multimodal features and DL architecture.
37

Said, Omar, and Amr Tolba. "Performance Evaluation of a Dual Coverage System for Internet of Things Environments." Mobile Information Systems 2016 (2016): 1–20. http://dx.doi.org/10.1155/2016/3464392.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
A dual coverage system for Internet of Things (IoT) environments is introduced. This system is used to connect IoT nodes regardless of their locations. The proposed system has three different architectures, which are based on satellites and High Altitude Platforms (HAPs). In case of Internet coverage problems, the Internet coverage will be replaced with the Satellite/HAP network coverage under specific restrictions such as loss and delay. According to IoT requirements, the proposed architectures should include multiple levels of satellites or HAPs, or a combination of both, to cover the global Internet things. It was shown that the Satellite/HAP/HAP/Things architecture provides the largest coverage area. A network simulation package, NS2, was used to test the performance of the proposed multilevel architectures. The results indicated that the HAP/HAP/Things architecture has the best end-to-end delay, packet loss, throughput, energy consumption, and handover.
38

Hamdan, Salam, Moussa Ayyash, and Sufyan Almajali. "Edge-Computing Architectures for Internet of Things Applications: A Survey." Sensors 20, no. 22 (November 11, 2020): 6441. http://dx.doi.org/10.3390/s20226441.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
The rapid growth of the Internet of Things (IoT) applications and their interference with our daily life tasks have led to a large number of IoT devices and enormous sizes of IoT-generated data. The resources of IoT devices are limited; therefore, the processing and storing IoT data in these devices are inefficient. Traditional cloud-computing resources are used to partially handle some of the IoT resource-limitation issues; however, using the resources in cloud centers leads to other issues, such as latency in time-critical IoT applications. Therefore, edge-cloud-computing technology has recently evolved. This technology allows for data processing and storage at the edge of the network. This paper studies, in-depth, edge-computing architectures for IoT (ECAs-IoT), and then classifies them according to different factors such as data placement, orchestration services, security, and big data. Besides, the paper studies each architecture in depth and compares them according to various features. Additionally, ECAs-IoT is mapped according to two existing IoT layered models, which helps in identifying the capabilities, features, and gaps of every architecture. Moreover, the paper presents the most important limitations of existing ECAs-IoT and recommends solutions to them. Furthermore, this survey details the IoT applications in the edge-computing domain. Lastly, the paper recommends four different scenarios for using ECAs-IoT by IoT applications.
39

Singh, Shailesh Pratap, Nauman Bin Ali, and Lars Lundberg. "Smart and Adaptive Architecture for a Dedicated Internet of Things Network Comprised of Diverse Entities: A Proposal and Evaluation." Sensors 22, no. 8 (April 14, 2022): 3017. http://dx.doi.org/10.3390/s22083017.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Advances in 5G and the Internet of Things (IoT) have to cater to the diverse and varying needs of different stakeholders, devices, sensors, applications, networks, and access technologies that come together for a dedicated IoT network for a synergistic purpose. Therefore, there is a need for a solution that can assimilate the various requirements and policies to dynamically and intelligently orchestrate them in the dedicated IoT network. Thus we identify and describe a representative industry-relevant use case for such a smart and adaptive environment through interviews with experts from a leading telecommunication vendor. We further propose and evaluate candidate architectures to achieve dynamic and intelligent orchestration in such a smart environment using a systematic approach for architecture design and by engaging six senior domain and IoT experts. The candidate architecture with an adaptive and intelligent element (“Smart AAA agent”) was found superior for modifiability, scalability, and performance in the assessments. This architecture also explores the enhanced role of authentication, authorization, and accounting (AAA) and makes the base for complete orchestration. The results indicate that the proposed architecture can meet the requirements for a dedicated IoT network, which may be used in further research or as a reference for industry solutions.
40

Carrillo-Mondejar, Javier, Juan Manuel Castelo Gomez, Carlos Núñez-Gómez, Jose Roldán Gómez, and José Luis Martínez. "Automatic Analysis Architecture of IoT Malware Samples." Security and Communication Networks 2020 (October 26, 2020): 1–12. http://dx.doi.org/10.1155/2020/8810708.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
The weakness of the security measures implemented on IoT devices, added to the sensitivity of the data that they handle, has created an attractive environment for cybercriminals to carry out attacks. To do so, they develop malware to compromise devices and control them. The study of malware samples is a crucial task in order to gain information on how to protect these devices, but it is impossible to manually do this due to the immense number of existing samples. Moreover, in the IoT, coexist multiple hardware architectures, such as ARM, PowerPC, MIPS, Intel 8086, or x64-86, which enlarges even more the quantity of malicious software. In this article, a modular solution to automatically analyze IoT malware samples from these architectures is proposed. In addition, the proposal is subjected to evaluation, analyzing a testbed of 1500 malware samples, proving that it is an effective approach to rapidly examining malicious software compiled for any architecture.
41

Tonato Chuquimarca, Carlos, and Soraya Sinche Maita. "Análisis comparativo entre arquitecturas de sistemas IoT." Revista de Investigación en Tecnologías de la Información 10, no. 21 (September 2022): 55–70. http://dx.doi.org/10.36825/riti.10.21.006.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
IoT systems are one of the current solutions for process automation. Its development is important to present solutions that adapt to new technologies. Despite its degree of use, there is not a unique architecture or reference model standardized that allows the development of an IoT system in a simple way. Developing an IoT system can be even more complicated when you don't have a unique guide. The present article makes a comparative study of two architectures and one reference model used for the development of IoT systems. The characteristics and functionalities of the selected cases will be exposed, and they will be compared to know the advantages and disadvantages of their use. The goal is to obtain a guide for the choice of an architecture or model for the realization of an IoT system, which has a support for its use; that is, it has already been used.
42

Belem Pacheco, Luis, Eduardo Pelinson Alchieri, and Priscila Mendez Barreto. "Device-Based Security to Improve User Privacy in the Internet of Things †." Sensors 18, no. 8 (August 14, 2018): 2664. http://dx.doi.org/10.3390/s18082664.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
The use of Internet of Things (IoT) is rapidly growing and a huge amount of data is being generated by IoT devices. Cloud computing is a natural candidate to handle this data since it has enough power and capacity to process, store and control data access. Moreover, this approach brings several benefits to the IoT, such as the aggregation of all IoT data in a common place and the use of cloud services to consume this data and provide useful applications. However, enforcing user privacy when sending sensitive information to the cloud is a challenge. This work presents and evaluates an architecture to provide privacy in the integration of IoT and cloud computing. The proposed architecture, called PROTeCt—Privacy aRquitecture for integratiOn of internet of Things and Cloud computing, improves user privacy by implementing privacy enforcement at the IoT devices instead of at the gateway, as is usually done. Consequently, the proposed approach improves both system security and fault tolerance, since it removes the single point of failure (gateway). The proposed architecture is evaluated through an analytical analysis and simulations with severely constrained devices, where delay and energy consumption are evaluated and compared to other architectures. The obtained results show the practical feasibility of the proposed solutions and demonstrate that the overheads introduced in the IoT devices are worthwhile considering the increased level of privacy and security.
43

Wu, Qi Wu, and Ling Zhi Jiang. "A Flexible Security Architecture for the Internet of Things." Applied Mechanics and Materials 241-244 (December 2012): 3255–59. http://dx.doi.org/10.4028/www.scientific.net/amm.241-244.3255.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Security architecture is the key problem of each network construction, Internet of things (IoT) is no exception. Firstly, existing research results in relation to security architecture of IoT are summarized. Then, on the basis of the analysis of the IoT security problem, this paper discusses the network security service requirements of IoT. Finally, a novel hierarchical and flexible secure architecture for IoT is proposed, which includes the security perception layer, security network layer and security application layer. Meanwhile, it involves security services entity and security management entity. The security architecture can provide strong technical support for security construction of IoT.
44

Berbes Villalón, Dalia M., Laura Sánchez Jiménez, Manuel de la Iglesia Campos, María E. Díaz Aguirre, and Tatiana Delgado Fernández. "An IoT architecture for smart cities based on the FIWARE platform." Revista de Ciencia y Tecnología, no. 38 (October 31, 2022): 20–27. http://dx.doi.org/10.36995/j.recyt.2022.38.003.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
The Internet of Things (IoT) is a concept that has been gaining considerable popularity today. It attempts to represent everyday things that are connected to the internet, but in reality it is much more than that. The overall aim is to interconnect the physical with the digital world, as the physical world is measured by sensors which translates into actionable data, and also the data can be translated into commands to be executed by actuators. Currently, the number of designed IoT architectures has increased considerably as a result of different approaches, standards and use cases. This leads to difficulties in understanding, selecting and using these architectures. In this work, an IoT architecture based on the FIWARE platform is proposed with the aim of facilitating the development of smart cities. With the proposal made, it was possible to integrate the main elements to be considered in this technology, thus offering a basis that serves as a guide, both for developing IoT systems and for creating more specific architectures that respond to the particular characteristics of a given application.
45

Seok, Byoungjin, Jinseong Park, and Jong Hyuk Park. "A Lightweight Hash-Based Blockchain Architecture for Industrial IoT." Applied Sciences 9, no. 18 (September 7, 2019): 3740. http://dx.doi.org/10.3390/app9183740.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Blockchain is a technology that can ensure data integrity in a distributed network, and it is actively applied in various fields. Recently, blockchain is gaining attention due to combining with the Internet of Things (IoT) technology in the industrial field. Moreover, many researchers have proposed the Industrial IoT (IIoT) architecture with blockchain for data integrity and efficient management. The IIoT network consists of many heterogeneous devices (e.g., sensors, actuators, and programmable logic controllers (PLC)) with resources-constrained, and the availability of the network must be preferentially considered. Therefore, applying the existed blockchain technology is still challenging. There are some results about the technique of constructing blockchain lightly to solve this challenge. However, in these results, the analysis in perspective of cryptographic performance (area, throughput, and power consumption) has not been considered sufficiently, or only focused on the architecture of the blockchain network. The blockchain technology is based on cryptographic techniques, and the main part is a cryptographic hash function. Therefore, if we construct the blockchain-based IIoT architecture, we have to consider the performance of the hash function. Many lightweight hash functions have been proposed recently for the resource-constrained environment, and it can also be used to the blockchain. Therefore, in this paper, we analyze the considerations of lightweight blockchain for IIoT. Also, we conduct an analysis of lightweight hash for blockchain, and propose a new lightweight hash-based blockchain architecture that can change the hash algorithm used for mining adjust to network traffic.
46

Sobhy, Dalia, Leandro Minku, Rami Bahsoon, and Rick Kazman. "Continuous and Proactive Software Architecture Evaluation: An IoT Case." ACM Transactions on Software Engineering and Methodology 31, no. 3 (July 31, 2022): 1–54. http://dx.doi.org/10.1145/3492762.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Design-time evaluation is essential to build the initial software architecture to be deployed. However, experts’ assumptions made at design-time are unlikely to remain true indefinitely in systems that are characterized by scale, hyperconnectivity, dynamism, and uncertainty in operations (e.g. IoT). Therefore, experts’ design-time decisions can be challenged at run-time. A continuous architecture evaluation that systematically assesses and intertwines design-time and run-time decisions is thus necessary. This paper proposes the first proactive approach to continuous architecture evaluation of the system leveraging the support of simulation. The approach evaluates software architectures by not only tracking their performance over time, but also forecasting their likely future performance through machine learning of simulated instances of the architecture. This enables architects to make cost-effective informed decisions on potential changes to the architecture. We perform an IoT case study to show how machine learning on simulated instances of architecture can fundamentally guide the continuous evaluation process and influence the outcome of architecture decisions. A series of experiments is conducted to demonstrate the applicability and effectiveness of the approach. We also provide the architect with recommendations on how to best benefit from the approach through choice of learners and input parameters, grounded on experimentation and evidence.
47

Giao, Joao, Artem A. Nazarenko, Fernando Luis-Ferreira, Diogo Gonçalves, and Joao Sarraipa. "A Framework for Service-Oriented Architecture (SOA)-Based IoT Application Development." Processes 10, no. 9 (September 5, 2022): 1782. http://dx.doi.org/10.3390/pr10091782.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
In the last decades, the increasing complexity of industrial information technology has led to the emergence of new trends in manufacturing. Factories are using multiple Internet of Things (IoT) platforms to harvest sensor information to improve production. Such a transformation contributes to efficiency growth and reduced production costs. To deal with the heterogeneity of the services within an IoT system, Service-Oriented Architecture (SOA) is referred to in the literature as being advantageous for the design and development of software to support IoT-based production processes. The aim of SOA-based design is to provide the leverage to use and reuse loosely coupled IoT services at the middleware layer to minimise system integration problems. We propose a system architecture that follows the SOA architectural pattern and enables developers and business process designers to dynamically add, query or use instances of existing modular software in the IoT context. Furthermore, an analysis of utilization of modular software that presents some challenges and limitations of this approach is also in the scope of this work.
48

Ayare, Miss Sonal Sanjay. "A Survey on IoT: Architecture, Applications and Future of IoT." International Journal for Research in Applied Science and Engineering Technology 7, no. 4 (April 30, 2019): 1235–39. http://dx.doi.org/10.22214/ijraset.2019.4221.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
49

Dineva, Kristina, and Tatiana Atanasova. "Design of Scalable IoT Architecture Based on AWS for Smart Livestock." Animals 11, no. 9 (September 15, 2021): 2697. http://dx.doi.org/10.3390/ani11092697.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
In the ecological future of the planet, intelligent agriculture relies on CPS and IoT to free up human resources and increase production efficiency. Due to the growing number of connected IoT devices, the maximum scalability capacity, and available computing power of the existing architectural frameworks will be reached. This necessitates finding a solution that meets the continuously growing demands in smart farming. Cloud-based IoT solutions are achieving increasingly high popularity. The aim of this study was to design a scalable cloud-based architecture for a smart livestock monitoring system following Agile methodology and featuring environmental monitoring, health, growth, behaviour, reproduction, emotional state, and stress levels of animals. The AWS services used, and their specific tasks related to the proposed architecture are explained in detail. A stress test was performed to prove the data ingesting and processing capability of the proposed architecture. Experimental results proved that the proposed architecture using AWS automated scaling mechanisms and IoT devices are fully capable of processing the growing amount of data, which in turn allow for meeting the required needs of the constantly expanding number of CPS systems.
50

U. Harita, Ms, and K. V.DayaSagar. "A survey on secured internet of things architecture." International Journal of Engineering & Technology 7, no. 2.7 (March 18, 2018): 274. http://dx.doi.org/10.14419/ijet.v7i2.7.10596.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
The Internet of Things (IoT) introduces an inventive and perceptive of a future Internet where users, computing systems, and everyday items owning sensing and actuating abilities cooperate with unique comfort and financial advantages. Many heterogeneous devices get connected and contribute to the IoT and are known as things.Internet of Things (IoT) enables these things to correspond, compute and make decisions on the network. In such a heterogeneous environment, every user of IoT will have a unique purpose to be served in the form of communication and computation. There is a threat that a malicious user can demolish the security and privacy of the network. Hence any application in the environment of IoT is prone to various attacks and threats. At this point, security becomes a high priority in IoT. To ensure security, care must be taken to guarantee confidentiality, authenticity, data integrity and non-repudiation. In this paperaddress various conventional techniques for providing security of IoT devices and present analysis of existing solutions for IoT. Firstly, as security will be a fundamental allowing thing of most IoT applications, mechanisms must also be designed to defend communications enabled by such technologies. Later, we identify some suitable security algorithms.

До бібліографії