3,087 research outputs found
Edge Computing: Enhancing Performance and Efficiency in IoT Applications
Aim: The aim behind this examination paper is to analyze the job of edge processing in working on generally execution and productivity in IoT applications. It expects to investigate the difficulties and suggestions helps that exist while coordinating parts of figuring engineering in various IoT situations.
Methods: The quantitative examination utilizes a blended technique approach consolidating subjective bits of knowledge and certifiable contextual analyses to extensively investigate the effect of field processing in the IoT climate. The quantitative assessment incorporates a near survey of inactivity decrease and transmission capacity enhancement between various IoT projects upheld by exact data and execution measurements. Subjective examination supplements the quantitative outcomes with important experiences from certifiable contextual analyses featuring the extraordinary capability of perspective processing in shrewd network the executives for medical care and independent engines.
Results: Quantitative examination shows significant enhancements in execution measurements by taking on halfway computational reaction. Delay limiting as seen in management checking in modern computerization and independent machines. Data transfer capacity advancement prompts shrewd metropolitan applications for exact agrarian retail investigation and natural checking. Genuine contextual analyses feature the significance of spatial registering in empowering continuous assessment of customization choices and adaptability in crucial IoT applications.
Conclusion: These discoveries feature the extraordinary effect of fringe registering on the IoT biological system with quicker reaction times empowering more proficient machine reaction and ideal organization usage
SymbioCity: Smart Cities for Smarter Networks
The "Smart City" (SC) concept revolves around the idea of embodying
cutting-edge ICT solutions in the very fabric of future cities, in order to
offer new and better services to citizens while lowering the city management
costs, both in monetary, social, and environmental terms. In this framework,
communication technologies are perceived as subservient to the SC services,
providing the means to collect and process the data needed to make the services
function. In this paper, we propose a new vision in which technology and SC
services are designed to take advantage of each other in a symbiotic manner.
According to this new paradigm, which we call "SymbioCity", SC services can
indeed be exploited to improve the performance of the same communication
systems that provide them with data. Suggestive examples of this symbiotic
ecosystem are discussed in the paper. The dissertation is then substantiated in
a proof-of-concept case study, where we show how the traffic monitoring service
provided by the London Smart City initiative can be used to predict the density
of users in a certain zone and optimize the cellular service in that area.Comment: 14 pages, submitted for publication to ETT Transactions on Emerging
Telecommunications Technologie
On the Role of Hash-Based Signatures in Quantum-Safe Internet of Things:Current Solutions and Future Directions
The Internet of Things (IoT) is gaining ground as a pervasive presence around
us by enabling miniaturized things with computation and communication
capabilities to collect, process, analyze, and interpret information.
Consequently, trustworthy data act as fuel for applications that rely on the
data generated by these things, for critical decision-making processes, data
debugging, risk assessment, forensic analysis, and performance tuning.
Currently, secure and reliable data communication in IoT is based on public-key
cryptosystems such as Elliptic Curve Cryptosystem (ECC). Nevertheless, reliance
on the security of de-facto cryptographic primitives is at risk of being broken
by the impending quantum computers. Therefore, the transition from classical
primitives to quantum-safe primitives is indispensable to ensure the overall
security of data en route. In this paper, we investigate applications of one of
the post-quantum signatures called Hash-Based Signature (HBS) schemes for the
security of IoT devices in the quantum era. We give a succinct overview of the
evolution of HBS schemes with emphasis on their construction parameters and
associated strengths and weaknesses. Then, we outline the striking features of
HBS schemes and their significance for the IoT security in the quantum era. We
investigate the optimal selection of HBS in the IoT networks with respect to
their performance-constrained requirements, resource-constrained nature, and
design optimization objectives. In addition to ongoing standardization efforts,
we also highlight current and future research and deployment challenges along
with possible solutions. Finally, we outline the essential measures and
recommendations that must be adopted by the IoT ecosystem while preparing for
the quantum world.Comment: 18 pages, 7 tables, 7 figure
Recommendations on the Internet of Things: Requirements, Challenges, and Directions
© 1997-2012 IEEE. The Internet of Things (IoT) is accelerating the growth of data available on the Internet, which makes the traditional search paradigms incapable of digging the information that people need from massive and deep resources. Furthermore, given the dynamic nature of organizations, social structures, and devices involved in IoT environments, intelligent and automated approaches become critical to support decision makers with the knowledge derived from the vast amount of information available through IoT networks. Indeed, IoT is more desirable of an effective and efficient paradigm of proactive discovering rather than postactive searching. This paper discusses some of the important requirements and key challenges to enable effective and efficient thing-of-interest recommendation and provides an array of new perspectives on IoT recommendation
The 10 Research Topics in the Internet of Things
Since the term first coined in 1999 by Kevin Ashton, the Internet of Things
(IoT) has gained significant momentum as a technology to connect physical
objects to the Internet and to facilitate machine-to-human and
machine-to-machine communications. Over the past two decades, IoT has been an
active area of research and development endeavours by many technical and
commercial communities. Yet, IoT technology is still not mature and many issues
need to be addressed. In this paper, we identify 10 key research topics and
discuss the research problems and opportunities within these topics.Comment: 10 pages. IEEE CIC 2020 vision pape
Modeling and evaluation of local IoT environments
The explosion in popularity and relevance of the Internet of Things has ushered in a new era in automatization and monitoring. Thousands of sensors can report measurements at the same time and greatly expand upon the possibilities of existing applications. However, to realize this new possibilities, adequate planning in new deployments is a must. This thesis proposes a model to emulate a complete IoT system, including all layers of its architecture, implemented using common and insdutry standard tools. Later, a number of different test scenarios are proposed and the model is tested under very different conditions. Such a model could be used as a first step in the feasibility study of new IoT deployments in many different scenarios.La explosión de popularidad y relevancia de Internet de las cosas ha dado paso a una nueva era en la automatización y monitorización. Miles de sensores pueden transmitir datos a la vez y ampliar enormemente las posibilidades de aplicaciones existentes. Sin embargo, para hacerlas realidad, es imprescindible una planificación adecuada para cada despliegue. Este trabajo propone un modelo que emula un sistema IoT completo, incluyendo todas las capas de su arquitectura e implementado utilizando herramientas comunes. Además, se presentan varias situaciones en los que se prueba el modelo en condiciones diferentes. Este modelo podría utilizarse en los primeros pasos de planificación de despliegues de implementaciones de IoT.L'explosió de popularitat i rellevància d'Internet de les coses ha donat pas a una nova era a l'automatització i monitorització. Milers de sensors poden transmetre dades alhora i ampliar enormement les possibilitats d'aplicacions existents. Tanmateix, per fer-les realitat és imprescindible una planificació adequada per a cada desplegament. Aquest treball proposa un model que emula un sistema IoT complet, incloent-hi totes les capes de la seva arquitectura i implementat utilitzant eines comunes. A més, es presenten diverses situacions en què es prova el model en condicions diferents. Aquest model es podria utilitzar en els primers passos de planificació de desplegaments d'implementacions de IoT
Computing in the Blink of an Eye: Current Possibilities for Edge Computing and Hardware-Agnostic Programming
With the rapid advancements of the internet of things, systems including sensing, communication, and computation become ubiquitous. The systems that are built with these technologies are increasingly complex and therefore require more automation and intelligent decision-making, while often including contact with humans. It is thus critical that such interactions run smoothly in real time, and that the automation strategies do not introduce important delays, usually not larger than 100 milliseconds, as the blink of a human eye. Pushing the deployment of the algorithms on embedded devices closer to where data is collected to avoid delays is one of the main motivations of edge computing. Further advantages of edge computing include improved reliability and data privacy management. This work showcases the possibilities of different embedded platforms that are often used as edge computing nodes: embedded microcontrollers, embedded microprocessors, FPGAs and embedded GPUs. The embedded solutions are compared with respect to their cost, complexity, energy consumption and computing speed establishing valuable guidelines for designers of complex systems that need to make use of edge computing. Furthermore, this paper shows the possibilities of hardware-agnostic programming using OpenCL, illustrating the price to pay in efficiency when software can be easily deployed on different hardware platforms.DFG, 414044773, Open Access Publizieren 2019 - 2020 / Technische Universität Berli
Computing in the blink of an eye: Current possibilities for edge computing and hardware-agnostic programming
With the rapid advancements of the internet of things, systems including sensing, communication, and computation become ubiquitous. The systems that are built with these technologies are increasingly complex and therefore require more automation and intelligent decision-making, while often including contact with humans. It is thus critical that such interactions run smoothly in real time, and that the automation strategies do not introduce important delays, usually not larger than 100 milliseconds, as the blink of a human eye. Pushing the deployment of the algorithms on embedded devices closer to where data is collected to avoid delays is one of the main motivations of edge computing. Further advantages of edge computing include improved reliability and data privacy management. This work showcases the possibilities of different embedded platforms that are often used as edge computing nodes: embedded microcontrollers, embedded microprocessors, FPGAs and embedded GPUs. The embedded solutions are compared with respect to their cost, complexity, energy consumption and computing speed establishing valuable guidelines for designers of complex systems that need to make use of edge computing. Furthermore, this paper shows the possibilities of hardware-agnostic programming using OpenCL, illustrating the price to pay in efficiency when software can be easily deployed on different hardware platforms
- …