• Title/Summary/Keyword: IoT Applications

Search Result 478, Processing Time 0.026 seconds

A Survey on Role of Block Chain in Smart Cities

  • Chokkanathan, K;Shanmugaraja, P;Ramasamy, Siva Shankar;Ouncharoen, Rujira;Chakpitak, Nopasit
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.7
    • /
    • pp.1-7
    • /
    • 2021
  • An amazing growth in the field of Internet of Things (IoT) and Blockchain based smart cities from both industry and academia has been witnessed in the recent years. There are many smart applications such as intelligent transportation, smart banking, improving the life style of citizen, energy consumption and managing the waste in the city, handling home needs are supporting the Smart city concept. These applications are profoundly supported by the advanced technologies like Blockchain as well as IoT in the recent past. Smart cities can be supported by the Blockchain core concepts such as secure, transparent, decentralized and immutable nature. Still, Blockchain and IoT technologies implementation in smart cities are in their early stages and significant research efforts are desirable to integrate them. This review article explores the roles and responsibilities of Blockchain and IoT in building smart cities.

A double-blockchain architecture for secure storage and transaction on the Internet of Things networks

  • Aldriwish, Khalid
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.6
    • /
    • pp.119-126
    • /
    • 2021
  • The Internet of Things (IoT) applications are quickly spread in many fields. Blockchain methods (BC), defined as a distributed sharing mechanism, offer excellent support for IoT evolution. The BC provides a secure way for communication between IoT devices. However, the IoT environments are threatened by hacker attacks and malicious intrusions. The IoT applications security are faced with three challenges: intrusions and attacks detection, secure communication, and compressed storage information. This paper proposed a system based on double-blockchain to improve the communication transactions' safety and enhance the information compression method for the stored data. Information security is enhanced by using an Ellipse Curve Cryptography (ECC) considered in a double-blockchain case. The data compression is ensured by the Compressed Sensing (CS) method. The conducted experimentation reveals that the proposed method is more accurate in security and storage performance than previous related works.

Vulnerabilities, Threats and Challenges on Cyber Security and the Artificial Intelligence based Internet of Things: A Comprehensive Study

  • Alanezi, Mohammed Ateeq
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.2
    • /
    • pp.153-158
    • /
    • 2022
  • The Internet of Things (IoT) has gotten a lot of research attention in recent years. IoT is seen as the internet's future. IoT will play a critical role in the future, transforming our lifestyles, standards, and business methods. In the following years, the use of IoT in various applications is likely to rise. In the world of information technology, cyber security is critical. In today's world, protecting data has become one of the most difficult tasks. Different type of emerging cyber threats such as malicious, network based and abuse of network have been identified in the IoT. These can be done by virus, Phishing, Spam and insider abuse. This paper focuses on emerging threats, various challenges and vulnerabilities which are faced by the cyber security in the field of IoT and its applications. It focuses on the methods, ethics, and trends that are reshaping the cyber security landscape. This paper also focuses on an attempt to classify various types of threats, by analyzing and characterizing the intruders and attacks facing towards the IoT devices and its services.

Methods to Design IoT Applications with Heterogeneity (IoT 애플리케이션의 이질성을 고려한 설계 기법)

  • Lee, Johan;Park, Chun Woo;Kim, Moon Kwon;Choi, Kwang Sun;Kim, Soo Dong
    • Annual Conference of KIPS
    • /
    • 2013.11a
    • /
    • pp.353-356
    • /
    • 2013
  • IoT(Internet-of-Things)는 사람과 물리적 사물이 언제, 어디서나 소통할 수 있는 컴퓨팅 패러다임으로, IoT 디바이스의 역량이 높아짐에 따라, IoT 디바이스를 이용한 IoT 애플리케이션 개발에 관심이 높아지고 있다. 하지만 IoT 디바이스가 가지는 통신 프로토콜 이질성, API 이질성, 데이터 형식 이질성, 프로그래밍 언어 이질성이 IoT 애플리케이션 개발의 어려움으로 작용하고 있다. 본 논문은 이러한 이질성들을 분석하고 각 이질성을 해결하기 위한 설계 기법을 제안하고 실제로 이를 적용하여 IoT 애플리케이션을 설계 및 구현 함으로써 도출한 이질성 해결의 중요성과 제안한 설계 기법의 실효성을 검증한다.

Performance Evaluation of Node.js for Web Service Gateway in IoT Remote Monitoring Applications

  • Nkenyereye, Lionel;Jang, Jong-Wook
    • International Journal of Advanced Culture Technology
    • /
    • v.4 no.3
    • /
    • pp.13-19
    • /
    • 2016
  • The growth of mobile devices in Internet of Things (IoT) leads to a number of remote and controlling system related IoT applications. For instance, home automation controlling system uses client system such web apps on smartphone or web service to access the home server by sending control commands. The home server receives the command, then controls for instance the light system. The web service gateway responsible for handling clients' requests attests an internet latency when an increasing number of end users requests submit toward it. Therefore, this web service gateway fails to detect several commands, slows down predefined actions which should be performed without human intervention. In this paper, we investigate the performance of a web server-side platgorm based event-driven, non-blocking approach called Node.js against traditional thread-based server side approach to handle a large number of client requests simultaneously for remote and controlling system in IoT remote monitoring applications. The Node.JS is 40% faster than the traditional web server side features thread-based approach. The use of Node.js server-side handles a large number of clients' requests, then therefore, reduces delay in performing predefined actions automatically in IoT environment.

Hierarchical IoT Edge Resource Allocation and Management Techniques based on Synthetic Neural Networks in Distributed AIoT Environments (분산 AIoT 환경에서 합성곱신경망 기반 계층적 IoT Edge 자원 할당 및 관리 기법)

  • Yoon-Su Jeong
    • Advanced Industrial SCIence
    • /
    • v.2 no.3
    • /
    • pp.8-14
    • /
    • 2023
  • The majority of IoT devices already employ AIoT, however there are still numerous issues that need to be resolved before AI applications can be deployed. In order to more effectively distribute IoT edge resources, this paper propose a machine learning-based approach to managing IoT edge resources. The suggested method constantly improves the allocation of IoT resources by identifying IoT edge resource trends using machine learning. IoT resources that have been optimized make use of machine learning convolution to reliably sustain IoT edge resources that are always changing. By storing each machine learning-based IoT edge resource as a hash value alongside the resource of the previous pattern, the suggested approach effectively verifies the resource as an attack pattern in a distributed AIoT context. Experimental results evaluate energy efficiency in three different test scenarios to verify the integrity of IoT Edge resources to see if they work well in complex environments with heterogeneous computational hardware.

Energy-Aware Data-Preprocessing Scheme for Efficient Audio Deep Learning in Solar-Powered IoT Edge Computing Environments (태양 에너지 수집형 IoT 엣지 컴퓨팅 환경에서 효율적인 오디오 딥러닝을 위한 에너지 적응형 데이터 전처리 기법)

  • Yeontae Yoo;Dong Kun Noh
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.18 no.4
    • /
    • pp.159-164
    • /
    • 2023
  • Solar energy harvesting IoT devices prioritize maximizing the utilization of collected energy due to the periodic recharging nature of solar energy, rather than minimizing energy consumption. Meanwhile, research on edge AI, which performs machine learning near the data source instead of the cloud, is actively conducted for reasons such as data confidentiality and privacy, response time, and cost. One such research area involves performing various audio AI applications using audio data collected from multiple IoT devices in an IoT edge computing environment. However, in most studies, IoT devices only perform sensing data transmission to the edge server, and all processes, including data preprocessing, are performed on the edge server. In this case, it not only leads to overload issues on the edge server but also causes network congestion by transmitting unnecessary data for learning. On the other way, if data preprocessing is delegated to each IoT device to address this issue, it leads to another problem of increased blackout time due to energy shortages in the devices. In this paper, we aim to alleviate the problem of increased blackout time in devices while mitigating issues in server-centric edge AI environments by determining where the data preprocessed based on the energy state of each IoT device. In the proposed method, IoT devices only perform the preprocessing process, which includes sound discrimination and noise removal, and transmit to the server if there is more energy available than the energy threshold required for the basic operation of the device.

Analyses of Requirement of Security based on Gateway Architecture for Secure Internet (사물인터넷망의 보안 및 프라이버시 문제 해결을 위한 게이트웨이 보안 구조 분석)

  • Kim, Jung Tae
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.6 no.3
    • /
    • pp.461-470
    • /
    • 2016
  • As IoT is broadly used in many fields, the security of IoT is becoming especially important and critical issues. Security and privacy are the key issues for IoT applications, and still faced with some enormous challenges. Sensor has limited resources such as computing power, memory, battery. By means of deeply analyzing the security architecture and features in security framework. While a number of researchers have explored such security challenges and open problems in IoT, there is an unfortunate lack of a systematic study of the security challenges in the IoT landscape. This special issue features recent and emerging advances IoT architecture, protocols, services and applications. The alternative method is IoT security gateway. In this paper, we surveyed the demands and requirements. By means of deeply analyzing the security architecture and features, we analyzed the demands and requirements for security based on gateway application.

Self-adaptive IoT Software Platform for Interoperable Standard-based IoT Systems (협업가능 표준기반 IoT 시스템을 위한 자가적응 IoT 소프트웨어 플랫폼 개발)

  • Sung, Nak-Myoung;Yun, Jaeseok
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.12 no.6
    • /
    • pp.369-375
    • /
    • 2017
  • In this paper, we present a self-adaptive software platform that enables an IoT gateway to perform autonomous operation considering IoT devices connected each other in resource-constrained environments. Based on the oneM2M device software platform publicly available, we have designed an additional part, called SAS (self-adaptive software) consisting of MAM (memory-aware module), NAM (network-aware module), BAM (battery-aware module), DAM (data-aware module), and DH (decision handler). A prototype system is implemented to show the feasibility of the proposed self-adaptive software architecture. Our proposed system demonstrates that it can adaptively adjust the operation of gateway and connected devices to their resource conditions under the desired service scenarios.

Performance Comparison of HTTP, HTTPS, and MQTT for IoT Applications

  • Sukjun Hong;Jinkyu Kang;Soonchul Kwon
    • International journal of advanced smart convergence
    • /
    • v.12 no.1
    • /
    • pp.9-17
    • /
    • 2023
  • Recently, IoT technology has been widely used in many industries. Also research on integrating IoT technology with IoT sensors is actively underway. One of the important challenges in IoT is to support low-latency communication. With the development of communication networks and protocols, a variety of protocols are being used, and their performance is improving. In this paper, we compare the performance and analyze the characteristics of some of the major communication protocols in IoT application, namely MQTT, HTTP, and HTTPS. IoT sensors acquired data by connecting an Arduino equipped with ESP8266 and a temperature and humidity sensor (DHT11). The server measured the performance by building servers for each protocol using AWS EC2. We analyzed the packets transmitted between the Arduino and the server during the data transmission. We measured the amount of data and transfer time. The measurement results showed that MQTT had the lowest data transmission time and data amount among the three protocols.