The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper presents a multi-layer distributed performance management model for Internet of Things (IoT) as a service for caregivers. Performance monitoring and control of IoT devices and services are vital functions for e-health systems. Cloud-based IoT systems with centralized data centers further underline the need for distributed management. The main contribution of this paper is a model and prototype...
Energy fuels the growth and development of any country, and as such effective monitoring, measurement, billing and access control is imperative. This paper presents a device that uses the evolving Internet of Things (IoT) technology in the design and implementation of an Internet based prepaid energy meter often referred to as smart meters. The energy measurement and billing system is automated. The...
Crowdsensing (CS) is a new data collection paradigm based on the willingness of people to utilize their mobile devices to sense and transmit data of interest. Given the large amount of cellular users, mobile sensor networks will be able to collect enough data to address large-scale societal problems in a fast, easy, and cost-effective manner. One important issue in CS is that of privacy; without appropriate...
6LoWPAN networks involving wireless sensors consist of resource starving miniature sensor nodes. Since secured authentication of these resource-constrained sensors is one of the important considerations during communication, use of asymmetric key distribution scheme may not be the perfect choice to achieve secure authentication. Recent research shows that Lucky Thirteen attack has compromised Datagram...
Smart devices have many sensors that capture the user data and use it for device control, improving the user experience, or send it through a computer network in order to be processed. The interaction between user and applications, especially in virtual reality, is made via motion and gestures with information offered by sensors such as accelerometer, compass or gyroscope. In order to reduce the complexity...
Internet of Things is capturing attention of consumer and enterprise electronics market with rapid implementations in home automation, smart cities, etc. Several power efficient, low cost sensors have been made available to developers to build these applications. A common theme here is the mode of communication where the computationally intensive work is being done at server side and the sensor-actuator...
In this demo, we introduce the tweet-based newsfeed summary service, called iApollo, running on a named data network (NDN) stack. This novel application provides a customized newsfeed service to individual readers based on their interests. Data sampling is essential in iApollo because of the large volume of tweets. Espresso, the automatic naming agent, translates this sampling problem into the simple...
The Internet of Things (IoT) consists of all kinds of sensors which collect much information. The privacy and anonymity in IoT is fundamental to the system and must be resolved. Sima proposed a protocol about lightweight authentication and key agreement and claimed to be secure and robust against all existing methods of attack. In this paper, the author points out the vulnerability of Sima's protocol...
Even in the 21st century human is still handicapped with natural disaster. Flood is one of the most catastrophic natural disasters. Early warnings help people to take necessary steps to save human lives and properties. Sensors can be used to provide more accurate early warnings due to possibilities of capturing more detail data of surrounding nature. Recent advantages in protocol standardization and...
Distributed Denial of Service (DDoS) attacks employing reflected UDP amplification are regularly used to disrupt networks and systems. The amplification allows one rented server to generate significant volumes of data, while the reflection hides the identity of the attacker. Consequently this is an attractive, low risk, strategy for criminals bent on vandalism and extortion. To measure the uptake...
We propose and analyze a 3-tier cloud-cloudlet-device hierarchical trust management protocol called IoT-HiTrust for large-scale IoT systems. Our mobile cloud hierarchical trust management protocol allows an IoT device to report its service experiences and query the trustworthiness of another IoT device for service composition and selection following a simple localized report-and-query paradigm. We...
The current research trend is about intelligent devices. There is a need to interconnect these intelligent embedded devices using the Internet and hence IoT devices have become more essential. Web of Things and Wisdom Web of Things are two technologies in their growing stages. This paper is a study on integration of IoT devices with WoT and W2T. An architecture has been designed to implement the interaction...
This paper investigates one possible way to reduce the wastage of clean water used in a public toilet. The study focuses on saving clean water from the use of an automatic urinal flushing system in a toilet. The automatic urinal flushing is set with different water flushing duration parameter. This is to find the most satisfied parameter for users while spending clean water as less as possible. In...
The Internet of Things (IoT) technology, based on the wireless sensor network, is developing rapidly and permeating into agriculture including livestock farming. Our research focuses on the problem that current industrial IoT system for livestock farming is tightly coupled, hard to expand, and with poor network performance. In this paper we proposed an integrated framework of smart livestock farming...
Nowadays, the Internet of Things (IoT) is receiving more attention in commercial and academic research, especially about its security property. However, current protocols cannot satisfy the requirement of various IoT applications and introduce some problems. There are three typical problems: traditional public key infrastructure (PKI) apply in IoT will incur great overhead, wireless sensor network...
With the advancements in electronics and communication, the electronic devices are being interconnected to create a controlled environment. The number of devices that are being connected to the Internet is booming day-by-day. However, the existing protocols are verbose and overburden the embedded devices having constrained resources in terms of memory, computational power, battery etc. As a relief,...
By the virtue of blooming automation industry and wireless connectivity, all the devices within the home can be connected. This improves the comfort, energy efficiency, indoor security, cost savings of the home. Small and constrained embedded devices are used to remotely monitor the conditions within home and control the home appliances. In such case, power consumption and network bandwidth become...
Data acquisition systems are fundamental components of modern distributed monitoring and control systems. The wide-spreading use of standard networking technologies in industrial scenarios, such as Ethernet, and the consolidation of web-based communication protocols, architectures and tools suggest the possibility to integrate out-of-the-box components to build a robust and reliable data acquisition...
This study introduces a distributed virtual laboratory for a multiagent programming course which has been very satisfactorily adopted by students, with a success rate of nearly 80%. It also aims at capturing the daily activity of students, providing the basis for data-driven assessment. Finally, it also allows for using process mining technologies to unveil successful and failed behaviors of students...
One of fields that takes advantage of IoT is home automation. Home automation uses different types of network protocols such as Wi-Fi, Bluetooth and ZigBee. However, existing home equipment often requires network communication enabled power plugs or devices that has a unique communication protocol specified by the company. Although these equipment have standard communication capabilities, each device...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.