287 research outputs found

    A survey of communication protocols for internet of things and related challenges of fog and cloud computing integration

    Get PDF
    The fast increment in the number of IoT (Internet of Things) devices is accelerating the research on new solutions to make cloud services scalable. In this context, the novel concept of fog computing as well as the combined fog-to-cloud computing paradigm is becoming essential to decentralize the cloud, while bringing the services closer to the end-system. This article surveys e application layer communication protocols to fulfill the IoT communication requirements, and their potential for implementation in fog- and cloud-based IoT systems. To this end, the article first briefly presents potential protocol candidates, including request-reply and publish-subscribe protocols. After that, the article surveys these protocols based on their main characteristics, as well as the main performance issues, including latency, energy consumption, and network throughput. These findings are thereafter used to place the protocols in each segment of the system (IoT, fog, cloud), and thus opens up the discussion on their choice, interoperability, and wider system integration. The survey is expected to be useful to system architects and protocol designers when choosing the communication protocols in an integrated IoT-to-fog-to-cloud system architecture.Peer ReviewedPostprint (author's final draft

    Supporting Cyber-Physical Systems with Wireless Sensor Networks: An Outlook of Software and Services

    Get PDF
    Sensing, communication, computation and control technologies are the essential building blocks of a cyber-physical system (CPS). Wireless sensor networks (WSNs) are a way to support CPS as they provide fine-grained spatial-temporal sensing, communication and computation at a low premium of cost and power. In this article, we explore the fundamental concepts guiding the design and implementation of WSNs. We report the latest developments in WSN software and services for meeting existing requirements and newer demands; particularly in the areas of: operating system, simulator and emulator, programming abstraction, virtualization, IP-based communication and security, time and location, and network monitoring and management. We also reflect on the ongoing efforts in providing dependable assurances for WSN-driven CPS. Finally, we report on its applicability with a case-study on smart buildings

    Osiguravanje međuoperabilnosti za Internet stvari: iskustvo s testiranjem CoAP protokola

    Get PDF
    Constrained Application Protocol (CoAP) is a specialized web transfer protocol, designed for realizing interoperation with constrained networks and nodes for machine to machine applications like smart energy, building automation, etc. As an important ubiquitous application protocol for the future Internet of Things, CoAP will be potentially implemented by a wide range of smart devices to achieve cooperative services. Therefore, a high level of interoperability of CoAP implementations is crucial. In this context, CoAP Plugtest – the first formal CoAP interoperability testing event was held in Paris, March 2012 to motivate vendors to verify the interoperability of their equipments. The event turned to be successful due to our contribution, including the test method and tool. This paper presents the testing method and procedure for the CoAP Plugtest event. To carry out the tests, a set of test objectives concerning the most important properties of CoAP have been selected and used to measure the interoperability of CoAP implementations. The process of verification has been automated by implementing a test validation tool based on the technique of passive testing. By using the test tool, a number of devices were successfully tested.Constrained Application Protocol (CoAP) je specijalizirani prijenosni protokol, dizajniran za realizaciju međuoperabilnosti uz ograničene mreĆŸame i čvorove za primjene poput pametne energije, automatizacije u zgradarstvu itd. Kao vaĆŸan i sveprisutan protokol za Internet stvari CoAP bi mogao biti implementiran kod velikog broja pametnih uređaja kako bi se ostvarile kooperativne usluge. Zbog toga je od velike vaĆŸnosti posticÂŽi visoku razinu međuoperabilnosti CoAP implementacija. U tom kontekstu, CoAP Pluqtest - prvo formalno testiranje CoAP međuoperabilnosti je odrĆŸano u Parizu u oĆŸujku 2012. kako bi se motivirali prodavači da provjere međuoperabilnost svoje opreme. Testiranje je bilo uspjeĆĄno zahvaljujući naĆĄem doprinosu koji uključuje metodu i alate za testiranje. U ovom radu prikazana je metoda i procedura testiranja za CoAP Pluqtest. Kako bi se proveli testovi odabran je skup ciljeva koji se odnose na najvaĆŸnija svojstva CoAP protokola i oni su koriĆĄteni za mjerenje međuoperabilnosti CoAP implementacija. Proces verifikacije je automatiziran implementacijom alata za provjeru testa koji se temelji na tehnici pasivnog testiranja. KoriĆĄtenjem alata za testiranje uspjeĆĄno su testirani brojni uređaji

    Managing Constrained Devices into the Cloud: a RESTful web service

    Get PDF
    We present a RESTful web application capable to provide high level, easy-to-reach interfaces for the interaction with CoAP sensor networks. We describe how virtual instances of physical devices are created in order to become a smart entry point for querying network objects. We explain how to exploit virtualization to lighten the workload of a physical network. We focus on the implementation of the application taking into consideration aspects such as scalability, responsiveness and availabilit

    Container-based microservice architecture for local IoT services

    Get PDF
    Abstract. Edge services are needed to save networking and computational resources on higher tiers, enable operation during network problems, and to help limiting private data propagation to higher tiers if the function needing it can be handled locally. MEC at access network level provides most of these features but cannot help when access network is down. Local services, in addition, help alleviating the MEC load and limit the data propagation even more, on local level. This thesis focuses on the local IoT service provisioning. Local service provisioning is subject to several requirements, related to resource/energy-efficiency, performance and reliability. This thesis introduces a novel way to design and implement a Docker container-based micro-service system for gadget-free future IoT (Internet of Things) network. It introduces a use case scenario and proposes few possible required micro-services as of solution to the scenario. Some of these services deployed on different virtual platforms along with software components that can process sensor data providing storage capacity to make decisions based on their algorithm and business logic while few other services deployed with gateway components to connect rest of the devices to the system of solution. It also includes a state-of-the-art study for design, implementation, and evaluation as a Proof-of-Concept (PoC) based on container-based microservices with Docker. The used IoT devices are Raspberry Pi embedded computers along with an Ubuntu machine with a rich set of features and interfaces, capable of running virtualized services. This thesis evaluates the solution based on practical implementation. In addition, the thesis also discusses the benefits and drawbacks of the system with respect to the empirical solution. The output of the thesis shows that the virtualized microservices could be efficiently utilized at the local and resource constrained IoT using Dockers. This validates that the approach taken in this thesis is feasible for providing such services and functionalities to the micro and nanoservice architecture. Finally, this thesis proposes numerous improvements for future iterations

    Building blocks for the internet of things

    Get PDF

    Event processing in web of things

    Get PDF
    The incoming digital revolution has the potential to drastically improve our productivity, reduce operational costs and improve the quality of the products. However, the realization of these promises requires the convergence of technologies — from edge computing to cloud, artificial intelligence, and the Internet of Things — blurring the lines between the physical and digital worlds. Although these technologies evolved independently over time, they are increasingly becoming intertwined. Their convergence will create an unprecedented level of automation, achieved via massive machine-to-machine interactions whose cornerstone are event processing tasks. This thesis explores the intersection of these technologies by making an in-depth analysis of their role in the life-cycle of event processing tasks, including their creation, placement and execution. First, it surveys currently existing Web standards, Internet drafts, and design patterns that are used in the creation of cloud-based event processing. Then, it investigates the reasons for event processing to start shifting towards the edge, alongside with the standards that are necessary for a smooth transition to occur. Finally, this work proposes the use of deep reinforcement learning methods for the placement and distribution of event processing tasks at the edge. Obtained results show that the proposed neural-based event placement method is capable of obtaining (near) optimal solutions in several scenarios and provide hints about future research directions.A nova revolução digital promete melhorar drasticamente a nossa produtividade, reduzir os custos operacionais e melhorar a qualidade dos produtos. A concretizacž ˜ao dessas promessas requer a convergˆencia de tecnologias – desde edge computing Ă  cloud, inteligĂȘncia artificial e Internet das coisas (IoT) – atenuando a linha que separa o mundo fĂ­sico do digital. Embora as quatro tecnologias mencionadas tenham evoluĂ­do de forma independente ao longo do tempo, atualmente elas estĂŁo cada vez mais interligadas. A convergĂȘncia destas tecnologias irĂĄ criar um nĂ­vel de automatização sem precedentes.The research published in this work was supported by the Portuguese Foundation for Science and Technology (FCT) through CEOT (Center for Electronic, Optoelectronic and Telecommunications) funding (UID/MULTI/00631/2020) and by FCT Ph.D grant to Andriy Mazayev (SFRH/BD/138836/2018)

    Exploring Data Security and Privacy Issues in Internet of Things Based on Five-Layer Architecture

    Get PDF
    Data Security and privacy is one of the serious issues in internet-based computing like cloud computing, mobile computing and Internet of Things (IoT). This security and privacy become manifolded in IoT because of diversified technologies and the interaction of Cyber Physical Systems (CPS) used in IoT. IoTs are being adapted in academics and in many organizations without fully protecting their assets and also without realizing that the traditional security solutions cannot be applied to IoT environment. This paper explores a comprehensive survey of IoT architectures, communication technologies and the security and privacy issues of them for a new researcher in IoT. This paper also suggests methods to thwart the security and privacy issues in the different layers of IoT architecture
    • 

    corecore