9,550 research outputs found

    A survey on subjecting electronic product code and non-ID objects to IP identification

    Full text link
    Over the last decade, both research on the Internet of Things (IoT) and real-world IoT applications have grown exponentially. The IoT provides us with smarter cities, intelligent homes, and generally more comfortable lives. However, the introduction of these devices has led to several new challenges that must be addressed. One of the critical challenges facing interacting with IoT devices is to address billions of devices (things) around the world, including computers, tablets, smartphones, wearable devices, sensors, and embedded computers, and so on. This article provides a survey on subjecting Electronic Product Code and non-ID objects to IP identification for IoT devices, including their advantages and disadvantages thereof. Different metrics are here proposed and used for evaluating these methods. In particular, the main methods are evaluated in terms of their: (i) computational overhead, (ii) scalability, (iii) adaptability, (iv) implementation cost, and (v) whether applicable to already ID-based objects and presented in tabular format. Finally, the article proves that this field of research will still be ongoing, but any new technique must favorably offer the mentioned five evaluative parameters.Comment: 112 references, 8 figures, 6 tables, Journal of Engineering Reports, Wiley, 2020 (Open Access

    Real-life performance of protocol combinations for wireless sensor networks

    Get PDF
    Wireless sensor networks today are used for many and diverse applications like nature monitoring, or process and wireless building automation. However, due to the limited access to large testbeds and the lack of benchmarking standards, the real-life evaluation of network protocols and their combinations remains mostly unaddressed in current literature. To shed further light upon this matter, this paper presents a thorough experimental performance analysis of six protocol combinations for TinyOS. During these protocol assessments, our research showed that the real-life performance often differs substantially from the expectations. Moreover, we found that combining protocols is far from trivial, as individual network protocols may perform very different in combination with other protocols. The results of our research emphasize the necessity of a flexible generic benchmarking framework, powerful enough to evaluate and compare network protocols and their combinations in different use cases

    Katakan tidak pada rasuah

    Get PDF
    Isu atau masalah rasuah menjadi topik utama sama ada di peringkat antarabangsa mahupun di peringkat dalam negara. Pertubuhan Bangsa- bangsa Bersatu menegaskan komitmen komuniti antarabangsa bertegas untuk mencegah dan mengawal rasuah melalui buku bertajuk United Nations Convention against Corruption. Hal yang sama berlaku di Malaysia. Melalui pernyataan visi oleh mantan Perdana Menteri Malaysia, Tun Dr. Mahathir bin Mohamed memberikan indikasi bahawa kerajaan Malaysia komited untuk mencapai aspirasi agar Malaysia dikenali kerana integriti dan bukannya rasuah. Justeru, tujuan penulisan bab ini adalah untuk membincangkan rasuah dari beberapa sudut termasuk perbincangan dari sudut agama Islam, faktor-faktor berlakunya gejala rasuah, dan usaha-usaha yang dijalankan di Malaysia untuk membanteras gejala rasuah. Perkara ini penting bagi mengenalpasti penjawat awam menanamkan keyakinan dalam melaksanakan tanggungjawab dengan menghindari diri daripada rasuah agar mereka sentiasa peka mengutamakan kepentingan awam

    Supporting protocol-independent adaptive QoS in wireless sensor networks

    Get PDF
    Next-generation wireless sensor networks will be used for many diverse applications in time-varying network/environment conditions and on heterogeneous sensor nodes. Although Quality of Service (QoS) has been ignored for a long time in the research on wireless sensor networks, it becomes inevitably important when we want to deliver an adequate service with minimal efforts under challenging network conditions. Until now, there exist no general-purpose QoS architectures for wireless sensor networks and the main QoS efforts were done in terms of individual protocol optimizations. In this paper we present a novel layerless QoS architecture that supports protocol-independent QoS and that can adapt itself to time-varying application, network and node conditions. We have implemented this QoS architecture in TinyOS on TmoteSky sensor nodes and we have shown that the system is able to support protocol-independent QoS in a real life office environment

    IETF standardization in the field of the Internet of Things (IoT): a survey

    Get PDF
    Smart embedded objects will become an important part of what is called the Internet of Things. However, the integration of embedded devices into the Internet introduces several challenges, since many of the existing Internet technologies and protocols were not designed for this class of devices. In the past few years, there have been many efforts to enable the extension of Internet technologies to constrained devices. Initially, this resulted in proprietary protocols and architectures. Later, the integration of constrained devices into the Internet was embraced by IETF, moving towards standardized IP-based protocols. In this paper, we will briefly review the history of integrating constrained devices into the Internet, followed by an extensive overview of IETF standardization work in the 6LoWPAN, ROLL and CoRE working groups. This is complemented with a broad overview of related research results that illustrate how this work can be extended or used to tackle other problems and with a discussion on open issues and challenges. As such the aim of this paper is twofold: apart from giving readers solid insights in IETF standardization work on the Internet of Things, it also aims to encourage readers to further explore the world of Internet-connected objects, pointing to future research opportunities
    corecore