6,680 research outputs found
On the Deployment of Healthcare Applications over Fog Computing Infrastructure
Fog computing is considered as the most promising enhancement of the traditional cloud computing paradigm in order to handle potential issues introduced by the emerging Interned of Things (IoT) framework at the network edge. The heterogeneous nature, the extensive distribution and the hefty number of deployed IoT nodes will disrupt existing functional models, creating confusion. However, IoT will facilitate the rise of new applications, with automated healthcare monitoring platforms being amongst them. This paper presents the pillars of design for such applications, along with the evaluation of a working prototype that collects ECG traces from a tailor-made device and utilizes the patient's smartphone as a Fog gateway for securely sharing them to other authorized entities. This prototype will allow patients to share information to their physicians, monitor their health status independently and notify the authorities rapidly in emergency situations. Historical data will also be available for further analysis, towards identifying patterns that may improve medical diagnoses in the foreseeable future
The Emerging Internet of Things Marketplace From an Industrial Perspective: A Survey
The Internet of Things (IoT) is a dynamic global information network
consisting of internet-connected objects, such as Radio-frequency
identification (RFIDs), sensors, actuators, as well as other instruments and
smart appliances that are becoming an integral component of the future
internet. Over the last decade, we have seen a large number of the IoT
solutions developed by start-ups, small and medium enterprises, large
corporations, academic research institutes (such as universities), and private
and public research organisations making their way into the market. In this
paper, we survey over one hundred IoT smart solutions in the marketplace and
examine them closely in order to identify the technologies used,
functionalities, and applications. More importantly, we identify the trends,
opportunities and open challenges in the industry-based the IoT solutions.
Based on the application domain, we classify and discuss these solutions under
five different categories: smart wearable, smart home, smart, city, smart
environment, and smart enterprise. This survey is intended to serve as a
guideline and conceptual framework for future research in the IoT and to
motivate and inspire further developments. It also provides a systematic
exploration of existing research and suggests a number of potentially
significant research directions.Comment: IEEE Transactions on Emerging Topics in Computing 201
Experimental Study on Low Power Wide Area Networks (LPWAN) for Mobile Internet of Things
In the past decade, we have witnessed explosive growth in the number of
low-power embedded and Internet-connected devices, reinforcing the new
paradigm, Internet of Things (IoT). The low power wide area network (LPWAN),
due to its long-range, low-power and low-cost communication capability, is
actively considered by academia and industry as the future wireless
communication standard for IoT. However, despite the increasing popularity of
`mobile IoT', little is known about the suitability of LPWAN for those mobile
IoT applications in which nodes have varying degrees of mobility. To fill this
knowledge gap, in this paper, we conduct an experimental study to evaluate,
analyze, and characterize LPWAN in both indoor and outdoor mobile environments.
Our experimental results indicate that the performance of LPWAN is surprisingly
susceptible to mobility, even to minor human mobility, and the effect of
mobility significantly escalates as the distance to the gateway increases.
These results call for development of new mobility-aware LPWAN protocols to
support mobile IoT.Comment: To appear at 2017 IEEE 85th Vehicular Technology Conference (VTC'17
Spring
The Internet of Hackable Things
The Internet of Things makes possible to connect each everyday object to the
Internet, making computing pervasive like never before. From a security and
privacy perspective, this tsunami of connectivity represents a disaster, which
makes each object remotely hackable. We claim that, in order to tackle this
issue, we need to address a new challenge in security: education
- …