4 research outputs found

    Emerging services for Internet of Things

    Get PDF

    History-based consistency algorithm for the trickle-timer with low-power and lossy networks

    Get PDF
    Recently, the internet of things (IoT) has become an important concept which has changed the vision of the Internet with the appearance of IPv6 over low power and lossy networks (6LoWPAN). However, these 6LoWPANs have many drawbacks because of the use of many devices with limited resources; therefore, suitable protocols such as the Routing Protocol for low power and lossy networks (RPL) were developed, and one of RPL's main components is the trickle timer algorithm, used to control and maintain the routing traffic frequency caused by a set of control messages. However, the trickle timer suffered from the short-listen problem which was handled by adding the listen-only period mechanism. This addition increased the delay in propagating transmissions and resolving the inconsistency in the network. However, to solve this problem we proposed the history based consistency algorithm (HBC), which eliminates the listen-only period based on the consistency period of the network. The proposed algorithm showed very good results. We measured the performance of HBC trickle in terms of convergence time; which was mainly affected, the power consumption and the packet delivery ratio (PDR). We made a comparison between the original trickle timer, the E-Trickle, the optimized trickle and our HBC trickle algorithm. The PDR and the power consumption showed in some cases better results under the HBC trickle compared to other trickle timers and in other cases the results were very close to the original trickle indicating the efficiency of the proposed trickle in choosing optimal routes when sending messages

    Making sense of the Internet of Things: A critical review of Internet of Things definitions between 2005 and 2019

    Get PDF
    Purpose: This paper aims to study the evolution of definitions of internet of things (IoT) through time, critically assess the knowledge these definitions contain and facilitate sensemaking by providing those unfamiliar with IoT with a theoretical definition and an extended framework. Design/methodology/approach: 164 articles published between 2005 and 2019 are collected using snowball sampling. Further, 100 unique definitions are identified in the sample. Definitions are examined using content analysis and applying a theoretical framework of five knowledge dimensions. Findings: In declarative/relational dimensions of knowledge, increasing levels of agreement are observed in the sample. Sources of tautological reasoning are identified. In conditional and causal dimensions, definitions of IoT remain underdeveloped. In the former, potential limitations of IoT related to resource scarcity, privacy and security are overlooked. In the latter, three main loci of agreement are identified. Research limitations/implications: This study does not cover all published definitions of IoT. Some narratives may be omitted by our selection criteria and process. Practical implications: This study supports sensemaking of IoT. Main loci of agreement in definitions of IoT are identified. Avenues for further clarification and consensus are explored. A new framework that can facilitate further investigation and agreement is introduced. Originality/value: This is, to the authors’ knowledge, the first study that examines the historical evolution of definitions of IoT vis-à-vis its technological features. This study introduces an updated framework to critically assess and compare definitions, identify ambiguities and resolve conflicts among different interpretations. The framework can be used to compare past and future definitions and help actors unfamiliar with IoT to make sense of it in a way to reduce adoption costs. It can also support researchers in studying early discussions of IoT

    Monografía Internet de las Cosas: Modelos de Comunicación, Desafíos y Aplicaciones.

    Get PDF
    172(10)hojas6.1 Consideraciones de seguridad en IoT. [29] ...................................................... 136 6.2 Principales desafíos de seguridad en el desarrollo de software de ambientes IoT 138 6.2.1 Autenticación ............................................................................................ 138 6.2.2 Control de acceso ..................................................................................... 138 6.2.3 Privacidad ................................................................................................. 139 6.2.4 Interoperabilidad ....................................................................................... 139 6.3 INCIDENTES DE SEGURIDAD IoT ................................................................. 143 6.3.1 Puerto Rican Electric Power Authority (PREPA) (Medidores inteligentes puertorriqueños pirateados en 2009) ...................................................................... 143 6.3.2 Foscam IP baby-cam (Hackeada en 2013) ............................................... 143 6.3.3 TARGET (Robo De Datos en 2013) .......................................................... 144 6.3.4 VTech (robo de datos 2015) ..................................................................... 145 6.3.5 OVH hosting provider (Ataque DDos 2016) .............................................. 146 6.3.6 Cloudpets (Robo de datos 2017) .............................................................. 147QUE ES EL INTERNET, CLASIFICACIÓN DE UNA RED, MODELOS DE COMUNICACIÓNTesis. Programa Ingeniería de sistemas. Universidad de los Llanos. Facultad de Ciencias Básicas e Ingeniería., 2018, Resultado para Optar el Titulo de Ingeniero de Sistemas.PregradoIngeniería de Sistema
    corecore