An Internet of Things (IoT) middleware can solve interoperability problem among “things” in IoT infrastructure by collecting data. However, the sensor nodes’ data that is collected by the middleware cannot be directly delivered to cloud applications since the sensor nodes and the middleware are located in intranet. A solution to this problem is an Internet Gateway Device (IGD) that retrieves data from the middleware in intranet then forwards them to cloud applications in the internet. In this study, an IGD based on cellular network is proposed to provide wide-coverage internet connectivity. Two test scenarios were conducted to measure delay and throughput between the IGD and the cloud application; using data from DHT22 sensor and image sensor respectively. The results of the first test scenario using DHT22 sensor show that the average delay is under 5 seconds and the maximum throughput is 120 bps, while the second one using image sensor concludes that the average delay is 595 seconds and the maximum throughput is 909 bps.
Architectural design of IoT-cloud computing integration platformTELKOMNIKA JOURNAL
An integration between the Internet of Things (IoT) and cloud computing can potentially leverage the
utilization of both sides. As the IoT based system is mostly composed by the interconnection of pervasive
and constrained devices, it can take a benefit of virtually unlimited resources of cloud entity i.e storage
and computation services to store and process its sensed data. On the other hand, the cloud computing
system may get benefit from IoT by broadening its reach to real world environment applications. In order
to incarnate this idea, a cloud software platform is needed to provide an integration layer between the IoT
and cloud computing taking into account the heterogenity of network communication protocols as well as the
security and data management issues. In this study, an architectural design of IoT-cloud platform for IoT and
cloud computing integration is presented. The proposed software platform can be decomposed into five main
components namely cloud-to-device interface, authentication, data management, and cloud-to-user interface
component. In general, the cloud-to-device interface acts as a data transmission endpoint between the whole
cloud platform system and its IoT devices counterpart. Before a session of data transmission established,
the communication interface contact the authentication component to make sure that the corresponding IoT
device is legitimate before it allowed for sending the sensor data to cloud environment. Notice that a valid IoT
device can be registered to the cloud system through web console component. The received sensor data
are then collected in data storage component. Any stored data can be further analyzed by data processing
component. User or any developed applications can then retrieve collected data, either raw or processed
data, through API data access and web console.
This document provides a review of the Internet of Things (IoT). It defines IoT as connecting physical objects to the internet through sensors that allow the objects to communicate and exchange data. The review discusses the history and key elements of IoT, including sensing, communication, data analytics, and delivery of information to users. It also outlines the layers of IoT architecture, enabling technologies like RFID and wireless sensor networks, and both advantages and security threats of the IoT approach. The goal is to provide a generalized overview of the widely known IoT technology.
Integration of internet of things with wireless sensor networkIJECEIAES
The Internet of things (IoT) is a major source for technology solutions in many industries. The IoT can consider, Wireless Sensor Network (WSN) as the backbone network to reduce formation or advent of new technology. Integration of these would reduce the burden and form smart sensor node network with nodes given access to internet. WSN is already a major legacy system that has percolated into many industries. Thus by integration of IoT and WSN no huge paradigm shift is needed for the industries.
FAST PACKETS DELIVERY TECHNIQUES FOR URGENT PACKETS IN EMERGENCY APPLICATIONS...IJCNCJournal
Internet of Things (IoT) has been receiving a lot of interest around the world in academia, industry and telecommunication organizations. In IoT, many constrained devices can communicate with each other which generate a huge number of transferred packets. These packets have different priorities based on the applications which are supported by IoT technology. Emergency applications such as calling an ambulance in a car accident scenario need fast and reliable packets delivery in order to receive an immediate response from a service provider. When a client sends his request with specific requirements, fast and reliable return contents (packets) should be fulfilled, otherwise, the network resources may be wasted and undesirable circumstances may be counted. Content-Centric Networking (CCN) has become a promising network paradigm that satisfies the requirements of fast packets delivery for emergency applications of IoT. In this paper, we propose fast packets delivery techniques based on CCN for IoT environment, these techniques are suitable for urgent packets in emergency applications that need fast delivery. The simulation results show how the proposed techniques can achieve high throughput, a large number of request messages, fast response time and a low number of lost packets in comparison with the normal CCN.
The document provides an overview of the Internet of Things (IoT). It begins with definitions of IoT and discusses the components that make up IoT systems, including physical devices, connectivity networks, edge computing, data storage and processing, applications, and collaboration. It then describes four common communication models in IoT - device-to-device, device-to-cloud, device-to-gateway, and back-end data sharing. Next, it explains how IoT works at both a non-technical and technical level, involving devices, sensors, networking, software kits, virtual devices, rules engines, and cloud servers. Finally, it outlines some key challenges with IoT, such as the need for open standards, sharing
Integrated smart door system in apartment room based on internetTELKOMNIKA JOURNAL
Internet of Things (IoT) is technology which provides communication between machines without
human intervention. There are many applications that implement IoT technology e.g. smart power, smart
home, transportation management, and smart city. This paper proposes the usage of IoT to develop
electronic key that can help to improve the security in apartment. Electronic key uses Android smart phone
to access and control the door. Electronic key uses Raspberry pii, motor DC, webcam, microswitch, and
Arduino GSM. Raspberry is used to get command from server and instruct the Arduino GSM to open or
close the door and webcam is used to take picture from the environment for documentation. This research
uses three steps to verify the user who want to open or close the door i.e. using username and password,
bluetooth, and QR code scanner.
Architectural Layers of Internet of Things: Analysis of Security Threats and ...Scientific Review SR
A pervasive network architecture that interconnect heterogeneous objects, devices, technologies and services called
Internet of Things has prompted a drastic change in demand of smart devices which in turn has increased the rate of
data exchange. These smart devices are built with numerous sensors which collect information from other interacting
devices, process it and send it to remote locations for storage or further processing. Although this mechanism of data
processing and sharing has contributed immensely to the information world, it has recently posed high security risk
on privacy and data confidentiality. This paper therefore analyses different security threats to data at different
architectural layers of Internet of Things, possible countermeasures and other in-depth security measures for Internet
of Things. The paper identifies device authentication on IoT network to be of paramount impo rtance in securing IoT
systems. This paper also suggests some essential technologies of security such as encryption for securing IoT
devices and the data shared over IoT network
Development of web-based surveillance system for Internet of Things (IoT) app...journalBEEI
With the advancement of wireless technology, our dependency on smart system has increases to a higher level than before. Without doubt, integration between different technologies becomes inevitable in order create affordable surveillance system. This paper presents the development of with web-based surveillance system with a dedicated Android-based mobile application using a Raspberry Pi and its supporting components i.e., Pi-Camera, PIR motion sensor, Ultrasonic sensor, web-based & mobile application. The designed system also utilizes Node-Red development tools as the platform to integrate all components of the system, MQTT as the communication protocol for data acquisition and ThingSpeak as the middleware. The proposed system can be implemented over the internet using any computer and mobile devices, at anywhere and anytime. The system can automatically stream live video viewed from the Android mobile application and the Raspberry Pi device can send an alert notification to users via email and SMS. The system can be one possible features in smart home system and is considered as an affordable solution, customizable and easy to implement in comparison with other commercial surveillance system products such as CCTV or IP Camera
Architectural design of IoT-cloud computing integration platformTELKOMNIKA JOURNAL
An integration between the Internet of Things (IoT) and cloud computing can potentially leverage the
utilization of both sides. As the IoT based system is mostly composed by the interconnection of pervasive
and constrained devices, it can take a benefit of virtually unlimited resources of cloud entity i.e storage
and computation services to store and process its sensed data. On the other hand, the cloud computing
system may get benefit from IoT by broadening its reach to real world environment applications. In order
to incarnate this idea, a cloud software platform is needed to provide an integration layer between the IoT
and cloud computing taking into account the heterogenity of network communication protocols as well as the
security and data management issues. In this study, an architectural design of IoT-cloud platform for IoT and
cloud computing integration is presented. The proposed software platform can be decomposed into five main
components namely cloud-to-device interface, authentication, data management, and cloud-to-user interface
component. In general, the cloud-to-device interface acts as a data transmission endpoint between the whole
cloud platform system and its IoT devices counterpart. Before a session of data transmission established,
the communication interface contact the authentication component to make sure that the corresponding IoT
device is legitimate before it allowed for sending the sensor data to cloud environment. Notice that a valid IoT
device can be registered to the cloud system through web console component. The received sensor data
are then collected in data storage component. Any stored data can be further analyzed by data processing
component. User or any developed applications can then retrieve collected data, either raw or processed
data, through API data access and web console.
This document provides a review of the Internet of Things (IoT). It defines IoT as connecting physical objects to the internet through sensors that allow the objects to communicate and exchange data. The review discusses the history and key elements of IoT, including sensing, communication, data analytics, and delivery of information to users. It also outlines the layers of IoT architecture, enabling technologies like RFID and wireless sensor networks, and both advantages and security threats of the IoT approach. The goal is to provide a generalized overview of the widely known IoT technology.
Integration of internet of things with wireless sensor networkIJECEIAES
The Internet of things (IoT) is a major source for technology solutions in many industries. The IoT can consider, Wireless Sensor Network (WSN) as the backbone network to reduce formation or advent of new technology. Integration of these would reduce the burden and form smart sensor node network with nodes given access to internet. WSN is already a major legacy system that has percolated into many industries. Thus by integration of IoT and WSN no huge paradigm shift is needed for the industries.
FAST PACKETS DELIVERY TECHNIQUES FOR URGENT PACKETS IN EMERGENCY APPLICATIONS...IJCNCJournal
Internet of Things (IoT) has been receiving a lot of interest around the world in academia, industry and telecommunication organizations. In IoT, many constrained devices can communicate with each other which generate a huge number of transferred packets. These packets have different priorities based on the applications which are supported by IoT technology. Emergency applications such as calling an ambulance in a car accident scenario need fast and reliable packets delivery in order to receive an immediate response from a service provider. When a client sends his request with specific requirements, fast and reliable return contents (packets) should be fulfilled, otherwise, the network resources may be wasted and undesirable circumstances may be counted. Content-Centric Networking (CCN) has become a promising network paradigm that satisfies the requirements of fast packets delivery for emergency applications of IoT. In this paper, we propose fast packets delivery techniques based on CCN for IoT environment, these techniques are suitable for urgent packets in emergency applications that need fast delivery. The simulation results show how the proposed techniques can achieve high throughput, a large number of request messages, fast response time and a low number of lost packets in comparison with the normal CCN.
The document provides an overview of the Internet of Things (IoT). It begins with definitions of IoT and discusses the components that make up IoT systems, including physical devices, connectivity networks, edge computing, data storage and processing, applications, and collaboration. It then describes four common communication models in IoT - device-to-device, device-to-cloud, device-to-gateway, and back-end data sharing. Next, it explains how IoT works at both a non-technical and technical level, involving devices, sensors, networking, software kits, virtual devices, rules engines, and cloud servers. Finally, it outlines some key challenges with IoT, such as the need for open standards, sharing
Integrated smart door system in apartment room based on internetTELKOMNIKA JOURNAL
Internet of Things (IoT) is technology which provides communication between machines without
human intervention. There are many applications that implement IoT technology e.g. smart power, smart
home, transportation management, and smart city. This paper proposes the usage of IoT to develop
electronic key that can help to improve the security in apartment. Electronic key uses Android smart phone
to access and control the door. Electronic key uses Raspberry pii, motor DC, webcam, microswitch, and
Arduino GSM. Raspberry is used to get command from server and instruct the Arduino GSM to open or
close the door and webcam is used to take picture from the environment for documentation. This research
uses three steps to verify the user who want to open or close the door i.e. using username and password,
bluetooth, and QR code scanner.
Architectural Layers of Internet of Things: Analysis of Security Threats and ...Scientific Review SR
A pervasive network architecture that interconnect heterogeneous objects, devices, technologies and services called
Internet of Things has prompted a drastic change in demand of smart devices which in turn has increased the rate of
data exchange. These smart devices are built with numerous sensors which collect information from other interacting
devices, process it and send it to remote locations for storage or further processing. Although this mechanism of data
processing and sharing has contributed immensely to the information world, it has recently posed high security risk
on privacy and data confidentiality. This paper therefore analyses different security threats to data at different
architectural layers of Internet of Things, possible countermeasures and other in-depth security measures for Internet
of Things. The paper identifies device authentication on IoT network to be of paramount impo rtance in securing IoT
systems. This paper also suggests some essential technologies of security such as encryption for securing IoT
devices and the data shared over IoT network
Development of web-based surveillance system for Internet of Things (IoT) app...journalBEEI
With the advancement of wireless technology, our dependency on smart system has increases to a higher level than before. Without doubt, integration between different technologies becomes inevitable in order create affordable surveillance system. This paper presents the development of with web-based surveillance system with a dedicated Android-based mobile application using a Raspberry Pi and its supporting components i.e., Pi-Camera, PIR motion sensor, Ultrasonic sensor, web-based & mobile application. The designed system also utilizes Node-Red development tools as the platform to integrate all components of the system, MQTT as the communication protocol for data acquisition and ThingSpeak as the middleware. The proposed system can be implemented over the internet using any computer and mobile devices, at anywhere and anytime. The system can automatically stream live video viewed from the Android mobile application and the Raspberry Pi device can send an alert notification to users via email and SMS. The system can be one possible features in smart home system and is considered as an affordable solution, customizable and easy to implement in comparison with other commercial surveillance system products such as CCTV or IP Camera
Research Inventy : International Journal of Engineering and Scienceinventy
Research Inventy : International Journal of Engineering and Science is published by the group of young academic and industrial researchers with 12 Issues per year. It is an online as well as print version open access journal that provides rapid publication (monthly) of articles in all areas of the subject such as: civil, mechanical, chemical, electronic and computer engineering as well as production and information technology. The Journal welcomes the submission of manuscripts that meet the general criteria of significance and scientific excellence. Papers will be published by rapid process within 20 days after acceptance and peer review process takes only 7 days. All articles published in Research Inventy will be peer-reviewed.
OPTIMIZING SMART THINGS ADDRESSING THROUGH THE ZIGBEE-BASED INTERNET OF THINGSIJCNCJournal
Devices are becoming increasingly interconnected; linked with each other and with humans. The internet
of things(IoT) concept is currently used in machine to machine (M2M) applications like power, gas, and oil
utilities transmission and transport. The most profound challenge that IoT faces is how to connect several
very different devices into a network of things. In this regard, the standard for sending information between
devices supporting IoT is called ZigBee, also known as the IEEE 802.15.4-2006 standard: ZigBee is
indispensable to the functioning of the IoT. In this paper, OPNET has been used to simulate two quite
differently scaled Wireless Sensor Network environments. The two environments had quite different ZigBee
topologies; thus, an analysis of the performance in regard to each topology could be made. We
propose,ZigBee as optional addressing method for smart-things making up the smart world which
facilitates the transmission and analysis of data automatically.
F2CDM: Internet of Things for Healthcare Network Based Fog-to-Cloud and Data-...Istabraq M. Al-Joboury
Internet of Things (IoT) evolves very rapidly over time, since everything such as sensors/actuators linked together from around the world with use of evolution of ubiquitous computing through the Internet. These devices have a unique IP address in order to communicate with each other and transmit data with features of wireless technologies. Fog computing or so called edge computing brings all Cloud features to embedded devices at edge network and adds more features to servers like pre-store data of Cloud, fast response, and generate overhasty users reporting. Fog mediates between Cloud and IoT devices and thus enables new types of computing and services. The future applications take the advantage of combing the two concepts Fog and Cloud in order to provide low delay Fog-based and high capacity of storage Cloud-based. This paper proposes an IoT architecture for healthcare network based on Fog to Cloud and Data in Motion (F2CDM). The proposed architecture is designed and implemented over three sites: Site 1 contains the embedded devices layer, Site 2 consists of the Fog network layer, while Site 3 consists of the Cloud network. The Fog layer is represented by a middleware server in Al-Nahrain University with temporary storage such that the data lives inside for 30 min. During this time, the selection of up-normality in behavior is send to the Cloud while the rest of the data is wiped out. On the other hand, the Cloud stores all the incoming data from Fog permanently. The F2CDM works using Message Queue Telemetry Transport (MQTT) for fast response. The results show that all data can be monitored from the Fog in real time while the critical data can be monitored from Cloud. In addition, the response time is evaluated using traffic generator called Tsung. It has been found that the proposed architecture reduces traffic on Cloud network and provides better data analysis.
This document provides an overview of Internet of Things (IoT) concepts including:
- IoT comprises things that have unique identities and are connected to the internet to communicate and exchange data. By 2020 there will be 50 billion connected devices.
- IoT has characteristics like being dynamic and self-adapting, self-configuring, using interoperable communication protocols, and having unique identities.
- IoT applications include home automation, smart cities, environment monitoring, energy management, retail, logistics, agriculture, healthcare, and more.
- IoT devices use various protocols at the link, network, transport, and application layers to connect and exchange data. Common protocols discussed are Ethernet, WiFi,
Io t & amp; industry 4.0,internet of thingsSumanPramanik7
The document provides an overview of the Internet of Things (IoT). It defines IoT as the network of physical objects embedded with sensors that collect and exchange data. It describes how IoT works through a process of devices collecting data, communicating it, analyzing it, and acting on it. Some key points made include that the amount of data generated by IoT is expected to grow significantly and IoT connectivity is growing rapidly. The document also outlines common IoT technologies, protocols, communication models, applications and challenges.
IRJET- Blockchain for Large-Scale Internet of Things Data Storage and ProtectionIRJET Journal
This document proposes using blockchain technology for large-scale Internet of Things (IoT) data storage and protection. It discusses issues with centralized cloud-based IoT structures, including high computation and storage demands on cloud servers and security/trust issues from dependencies on centralized servers. The proposed system uses a distributed data storage scheme employing blockchain to eliminate centralized servers. IoT device data would be stored in a distributed hash table (DHT) using the blockchain to manage storage addresses. Edge computing is also incorporated to enable real-time computations and communications from nearby edge servers, addressing limitations of IoT devices' low computational power. The goal is to achieve distributed data storage, protection, and complex computations through storing data in DHT using blockchain and
UDP Pervasive Protocol Integration with IoT for Smart Home Environment using ...IJECEIAES
Pervasive computing is an environment which is used and integrated into every object and activities to meet human needs and its existence isn’t perceived as something specific. The concept of Smart Home is to assist human needs in an everyday object that performs controls or being controlled. Based on previous research the used communication protocol is UDP (User Datagram Protocol) and the programming language is LabVIEW. UDP is used because it does not require handshaking in the broadcast process, as well as on the use of memory more efficient than other protocols. Devices which perform controls called Host and which is controlled called Client. Both of them (Things) have an ability to send data to the Internet without any human interaction. So this research wants to conduct pervasive protocol between Host and Client which each device is integrated with the Internet of Things (IoT). Data are posted at dweet.io that is a cloud server website that contains a simple online data submission which has free services. This research is conducted to measure the communication performance between host to client, host to cloud server and client to cloud server that represents household equipment.
The document discusses key aspects of Internet of Things (IoT) architectures. It begins by explaining the differences between traditional IT systems and IoT, noting that IoT is focused on data generated by sensors. It then outlines the core functional stack of IoT including the things layer of physical devices, communication networks, and application/analytics layers. The document also describes two standardized IoT architectures from oneM2M and IoTWorld Forum. Finally, it discusses IoT data management using fog computing to distribute data processing close to the edge for reduced latency and network traffic.
The proposed home monitoring system uses sensors to monitor temperature and humidity in a home. The sensor data is sent to a web server and stored in the cloud. This allows users to access the sensor data from anywhere using a mobile phone or computer. The system also allows users to remotely control electric appliances in the home through the web server. When temperature or humidity thresholds are exceeded, the system can send alerts to users.
A Comprehensive Survey on Exiting Solution Approaches towards Security and Pr...IJECEIAES
‘Internet of Things (IoT)’emerged as an intelligent collaborative computation and communication between a set of objects capable of providing on-demand services to other objects anytime anywhere. A large-scale deployment of data-driven cloud applications as well as automated physical things such as embed electronics, software, sensors and network connectivity enables a joint ubiquitous and pervasive internet-based computing systems well capable of interacting with each other in an IoT. IoT, a well-known term and a growing trend in IT arena certainly bring a highly connected global network structure providing a lot of beneficial aspects to a user regarding business productivity, lifestyle improvement, government efficiency, etc. It also generates enormous heterogeneous and homogeneous data needed to be analyzed properly to get insight into valuable information. However, adoption of this new reality (i.e., IoT) by integrating it with the internet invites a certain challenges from security and privacy perspective. At present, a much effort has been put towards strengthening the security system in IoT still not yet found optimal solutions towards current security flaws. Therefore, the prime aim of this study is to investigate the qualitative aspects of the conventional security solution approaches in IoT. It also extracts some open research problems that could affect the future research track of IoT arena.
An Event-based Middleware for Syntactical Interoperability in Internet of Th...IJECEIAES
Internet of Things (IoT) connecting sensors or devices that record physical observations of the environment and a variety of applications or other Internet services. Along with the increasing number and diversity of devices connected, there arises a problem called interoperability. One type of interoperability is syntactical interoperability, where the IoT should be able to connect all devices through various data protocols. Based on this problem, we proposed a middleware that capable of supporting interoperability by providing a multi-protocol gateway between COAP, MQTT, and WebSocket. This middleware is developed using event-based architecture by implementing publish-subscribe pattern. We also developed a system to test the performance of middleware in terms of success rate and delay delivery of data. The system consists of temperature and humidity sensors using COAP and MQTT as a publisher and web application using WebSocket as a subscriber. The results for data transmission, either from sensors or MQTT COAP has a success rate above 90%, the average delay delivery of data from sensors COAP and MQTT below 1 second, for packet loss rate varied between 0% - 25%. The interoperability testing has been done using Interoperability assessment methodology and found out that ours is qualified.
The slides defines IoT and show the differnce between M2M and IoT vision. It then describes the different layers that depicts the functional architecture of IoT, standard organizations and bodies and other IoT technology alliances, low power IoT protocols, IoT Platform components, and finally gives a short description to one of IoT low power application protocols (MQTT).
The implementation of Internet of Cloud needs a broad vision of technology and computing. It
requires the incorporation of diverse technologies in order to realize its working. Cloud computing is
enabling the use of IoT in wide application areas. Its natural feature of being readily available is showing
tremendous advantages in Internet of Things and smart functionalities. However, there are a few aspects of
using cloud services in the IoT mainly revolving around data security and access policies. This paper
presents a perspective on this side of cloud usage and how it can be handled proficiently. A detailed study
and evaluation of selective security issues has been done to help the reader get acquainted with this side of
cloud in IoT.
This document discusses machine-to-machine (M2M) technology and how it differs from the Internet of Things (IoT). M2M refers to direct communication between machines without human involvement by using sensors, wireless networks, and centralized data collection. Key applications of M2M discussed include smart homes that remotely control appliances, healthcare monitoring of patients, retail management with digital signage and payment, and manufacturing process optimization with networked sensors. The main difference between M2M and IoT is that IoT uses both centralized and distributed network architectures while M2M only utilizes a centralized structure.
Performance Analysis of Internet of Things Protocols Based Fog/Cloud over Hig...Istabraq M. Al-Joboury
The Internet of Things (IoT) becomes the future of a global data field in which the embedded devices communicate with each other, exchange data and making decisions through the Internet. IoT could improves the qualityoflife in smart cities, but a massive amount of data from different smart devices could slow down or crash database systems. In addition, IoT data transfer to Cloud for monitoring information and generating feedback thus will lead to highdelay in infrastructure level. Fog Computing can help by offering services closer to edge devices. In this paper, we propose an efficient system architecture to mitigate the problem of delay. We provide performance analysis like responsetime, throughput and packet loss for MQTT (Message Queue Telemetry Transport) and HTTP (Hyper Text Transfer Protocol) protocols based on Cloud or Fog serverswith large volume of data form emulated traffic generator working alongsidewith one real sensor. We implement both protocols in the same architecture, with low cost embedded devices to local and Cloud servers with different platforms. The results show that HTTP response time is 12.1 and 4.76 times higher than MQTT Fog and cloud based located in the same geographical area of the sensors respectively. The worst case in performance is observed when the Cloud is public and outside the country region. The results obtained for throughput shows that MQTT has the capability to carry the data with available bandwidth and lowest percentage of packet loss. We also prove that the proposed Fog architecture is an efficient way to reduce latency and enhance performance in Cloud based IoT.
This document provides an overview of the Internet of Things (IoT). It discusses the history and concept of IoT, how IoT systems work, applications of IoT, the current state and future prospects. It also outlines key research areas like artificial intelligence and machine learning in IoT. The document details the typical architecture layers in an IoT system and new wireless technologies used in IoT like ZigBee, SigFox, and LTE-M. Finally, it discusses some criticisms, problems and controversies with IoT including issues around security, platform fragmentation, privacy and data storage.
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGSIJNSA Journal
The idea to connect everything to anything and at any point of time is what vaguely defines the concept of
the Internet of Things (IoT). The IoT is not only about providing connectivity but also facilitating
interaction among these connected things. Though the term IoT was introduced in 1999 but has drawn
significant attention during the past few years, the pace at which new devices are being integrated into the
system will profoundly impact the world in a good way but also poses some severe queries about security
and privacy. IoT in its current form is susceptible to a multitudinous set of attacks. One of the most
significant concerns of IoT is to provide security assurance for the data exchange because data is
vulnerable to some attacks by the attackers at each layer of IoT. The IoT has a layered structure where
each layer provides a service. The security needs vary from layer to layer as each layer serves a different
purpose. This paper aims to analyze the various security and privacy threats related to IoT. Some attacks
have been discussed along with some existing and proposed countermeasures.
A review on orchestration distributed systems for IoT smart services in fog c...IJECEIAES
This paper provides a review of orchestration distributed systems for IoT smart services in fog computing. The cloud infrastructure alone cannot handle the flow of information with the abundance of data, devices and interactions. Thus, fog computing becomes a new paradigm to overcome the problem. One of the first challenges was to build the orchestration systems to activate the clouds and to execute tasks throughout the whole system that has to be considered to the situation in the large scale of geographical distance, heterogeneity and low latency to support the limitation of cloud computing. Some problems exist for orchestration distributed in fog computing are to fulfil with high reliability and low-delay requirements in the IoT applications system and to form a larger computer network like a fog network, at different geographic sites. This paper reviewed approximately 68 articles on orchestration distributed system for fog computing. The result shows the orchestration distribute system and some of the evaluation criteria for fog computing that have been compared in terms of Borg, Kubernetes, Swarm, Mesos, Aurora, heterogeneity, QoS management, scalability, mobility, federation, and interoperability. The significance of this study is to support the researcher in developing orchestration distributed systems for IoT smart services in fog computing focus on IR4.0 national agenda.
Internet Of Things(IoT) is emerging technology in future world.The term IoT comprises of Cloud computing, Data mining,
Big data analytics, hardware board. The Security and Interoperability is a main factor that influences the IoT Enegy
consumption is also main fator for IoT application designing.The various protocols such as MQTT,AMQP,XMPP are used in
IoT.This paper analysis the various protocols used in Internet of Things.
The document discusses the key components of an Internet of Things (IoT) architecture. It describes the five layers of an IoT architecture: perception layer, object abstraction layer, service management layer, application layer, and business layer. It also discusses the key elements that enable IoT such as things, gateways, data streaming processors, data lakes, data warehouses, data analysts, machine learning models, and control applications. Security is an important consideration for IoT architectures and the requirements vary across the different layers.
Cloud computing is a new technology which refers to an infrastructure where both software and hardware application are operate for the network with the help of internet. Cloud computing provide these services with the help of rule know as you pay as you go on. Internet of things (IoT) is a new technology which is growing rapidly in the field of telecommunications. The aim of IoT devices is to connect all things around us to the internet and thus provide us with smarter cities, intelligent homes and generally more comfortable lives. The combation of cloud computing and IoT devices make rapid development of both technologies. In this paper, we present information about IoT and cloud computing with a focus on the security issues of both technologies. Concluding we present the contribution of cloud computing to the IoT technology. Thus, it shows how the cloud computing technology improves the function of the IoT. Finally present the security challenges of both technologies IoT and cloud computing.
Implementation of IoT in Agriculture: A Scientific Approach for Smart Irriga...Springer
This document describes an IoT-based smart irrigation prototype that was designed and implemented. The prototype automatically turns a motor pump on and off based on soil moisture levels, taking into account temperature and humidity. It uses an ESP32 microcontroller connected to DHT11 and moisture sensors. The data is sent to the Arduino IoT cloud via MQTT protocol and can be accessed worldwide. Test data from the prototype over the cloud and locally is presented. The document also provides background on IoT architectures and protocols, and discusses related work on smart agriculture applications using IoT and machine learning.
Research Inventy : International Journal of Engineering and Scienceinventy
Research Inventy : International Journal of Engineering and Science is published by the group of young academic and industrial researchers with 12 Issues per year. It is an online as well as print version open access journal that provides rapid publication (monthly) of articles in all areas of the subject such as: civil, mechanical, chemical, electronic and computer engineering as well as production and information technology. The Journal welcomes the submission of manuscripts that meet the general criteria of significance and scientific excellence. Papers will be published by rapid process within 20 days after acceptance and peer review process takes only 7 days. All articles published in Research Inventy will be peer-reviewed.
OPTIMIZING SMART THINGS ADDRESSING THROUGH THE ZIGBEE-BASED INTERNET OF THINGSIJCNCJournal
Devices are becoming increasingly interconnected; linked with each other and with humans. The internet
of things(IoT) concept is currently used in machine to machine (M2M) applications like power, gas, and oil
utilities transmission and transport. The most profound challenge that IoT faces is how to connect several
very different devices into a network of things. In this regard, the standard for sending information between
devices supporting IoT is called ZigBee, also known as the IEEE 802.15.4-2006 standard: ZigBee is
indispensable to the functioning of the IoT. In this paper, OPNET has been used to simulate two quite
differently scaled Wireless Sensor Network environments. The two environments had quite different ZigBee
topologies; thus, an analysis of the performance in regard to each topology could be made. We
propose,ZigBee as optional addressing method for smart-things making up the smart world which
facilitates the transmission and analysis of data automatically.
F2CDM: Internet of Things for Healthcare Network Based Fog-to-Cloud and Data-...Istabraq M. Al-Joboury
Internet of Things (IoT) evolves very rapidly over time, since everything such as sensors/actuators linked together from around the world with use of evolution of ubiquitous computing through the Internet. These devices have a unique IP address in order to communicate with each other and transmit data with features of wireless technologies. Fog computing or so called edge computing brings all Cloud features to embedded devices at edge network and adds more features to servers like pre-store data of Cloud, fast response, and generate overhasty users reporting. Fog mediates between Cloud and IoT devices and thus enables new types of computing and services. The future applications take the advantage of combing the two concepts Fog and Cloud in order to provide low delay Fog-based and high capacity of storage Cloud-based. This paper proposes an IoT architecture for healthcare network based on Fog to Cloud and Data in Motion (F2CDM). The proposed architecture is designed and implemented over three sites: Site 1 contains the embedded devices layer, Site 2 consists of the Fog network layer, while Site 3 consists of the Cloud network. The Fog layer is represented by a middleware server in Al-Nahrain University with temporary storage such that the data lives inside for 30 min. During this time, the selection of up-normality in behavior is send to the Cloud while the rest of the data is wiped out. On the other hand, the Cloud stores all the incoming data from Fog permanently. The F2CDM works using Message Queue Telemetry Transport (MQTT) for fast response. The results show that all data can be monitored from the Fog in real time while the critical data can be monitored from Cloud. In addition, the response time is evaluated using traffic generator called Tsung. It has been found that the proposed architecture reduces traffic on Cloud network and provides better data analysis.
This document provides an overview of Internet of Things (IoT) concepts including:
- IoT comprises things that have unique identities and are connected to the internet to communicate and exchange data. By 2020 there will be 50 billion connected devices.
- IoT has characteristics like being dynamic and self-adapting, self-configuring, using interoperable communication protocols, and having unique identities.
- IoT applications include home automation, smart cities, environment monitoring, energy management, retail, logistics, agriculture, healthcare, and more.
- IoT devices use various protocols at the link, network, transport, and application layers to connect and exchange data. Common protocols discussed are Ethernet, WiFi,
Io t & amp; industry 4.0,internet of thingsSumanPramanik7
The document provides an overview of the Internet of Things (IoT). It defines IoT as the network of physical objects embedded with sensors that collect and exchange data. It describes how IoT works through a process of devices collecting data, communicating it, analyzing it, and acting on it. Some key points made include that the amount of data generated by IoT is expected to grow significantly and IoT connectivity is growing rapidly. The document also outlines common IoT technologies, protocols, communication models, applications and challenges.
IRJET- Blockchain for Large-Scale Internet of Things Data Storage and ProtectionIRJET Journal
This document proposes using blockchain technology for large-scale Internet of Things (IoT) data storage and protection. It discusses issues with centralized cloud-based IoT structures, including high computation and storage demands on cloud servers and security/trust issues from dependencies on centralized servers. The proposed system uses a distributed data storage scheme employing blockchain to eliminate centralized servers. IoT device data would be stored in a distributed hash table (DHT) using the blockchain to manage storage addresses. Edge computing is also incorporated to enable real-time computations and communications from nearby edge servers, addressing limitations of IoT devices' low computational power. The goal is to achieve distributed data storage, protection, and complex computations through storing data in DHT using blockchain and
UDP Pervasive Protocol Integration with IoT for Smart Home Environment using ...IJECEIAES
Pervasive computing is an environment which is used and integrated into every object and activities to meet human needs and its existence isn’t perceived as something specific. The concept of Smart Home is to assist human needs in an everyday object that performs controls or being controlled. Based on previous research the used communication protocol is UDP (User Datagram Protocol) and the programming language is LabVIEW. UDP is used because it does not require handshaking in the broadcast process, as well as on the use of memory more efficient than other protocols. Devices which perform controls called Host and which is controlled called Client. Both of them (Things) have an ability to send data to the Internet without any human interaction. So this research wants to conduct pervasive protocol between Host and Client which each device is integrated with the Internet of Things (IoT). Data are posted at dweet.io that is a cloud server website that contains a simple online data submission which has free services. This research is conducted to measure the communication performance between host to client, host to cloud server and client to cloud server that represents household equipment.
The document discusses key aspects of Internet of Things (IoT) architectures. It begins by explaining the differences between traditional IT systems and IoT, noting that IoT is focused on data generated by sensors. It then outlines the core functional stack of IoT including the things layer of physical devices, communication networks, and application/analytics layers. The document also describes two standardized IoT architectures from oneM2M and IoTWorld Forum. Finally, it discusses IoT data management using fog computing to distribute data processing close to the edge for reduced latency and network traffic.
The proposed home monitoring system uses sensors to monitor temperature and humidity in a home. The sensor data is sent to a web server and stored in the cloud. This allows users to access the sensor data from anywhere using a mobile phone or computer. The system also allows users to remotely control electric appliances in the home through the web server. When temperature or humidity thresholds are exceeded, the system can send alerts to users.
A Comprehensive Survey on Exiting Solution Approaches towards Security and Pr...IJECEIAES
‘Internet of Things (IoT)’emerged as an intelligent collaborative computation and communication between a set of objects capable of providing on-demand services to other objects anytime anywhere. A large-scale deployment of data-driven cloud applications as well as automated physical things such as embed electronics, software, sensors and network connectivity enables a joint ubiquitous and pervasive internet-based computing systems well capable of interacting with each other in an IoT. IoT, a well-known term and a growing trend in IT arena certainly bring a highly connected global network structure providing a lot of beneficial aspects to a user regarding business productivity, lifestyle improvement, government efficiency, etc. It also generates enormous heterogeneous and homogeneous data needed to be analyzed properly to get insight into valuable information. However, adoption of this new reality (i.e., IoT) by integrating it with the internet invites a certain challenges from security and privacy perspective. At present, a much effort has been put towards strengthening the security system in IoT still not yet found optimal solutions towards current security flaws. Therefore, the prime aim of this study is to investigate the qualitative aspects of the conventional security solution approaches in IoT. It also extracts some open research problems that could affect the future research track of IoT arena.
An Event-based Middleware for Syntactical Interoperability in Internet of Th...IJECEIAES
Internet of Things (IoT) connecting sensors or devices that record physical observations of the environment and a variety of applications or other Internet services. Along with the increasing number and diversity of devices connected, there arises a problem called interoperability. One type of interoperability is syntactical interoperability, where the IoT should be able to connect all devices through various data protocols. Based on this problem, we proposed a middleware that capable of supporting interoperability by providing a multi-protocol gateway between COAP, MQTT, and WebSocket. This middleware is developed using event-based architecture by implementing publish-subscribe pattern. We also developed a system to test the performance of middleware in terms of success rate and delay delivery of data. The system consists of temperature and humidity sensors using COAP and MQTT as a publisher and web application using WebSocket as a subscriber. The results for data transmission, either from sensors or MQTT COAP has a success rate above 90%, the average delay delivery of data from sensors COAP and MQTT below 1 second, for packet loss rate varied between 0% - 25%. The interoperability testing has been done using Interoperability assessment methodology and found out that ours is qualified.
The slides defines IoT and show the differnce between M2M and IoT vision. It then describes the different layers that depicts the functional architecture of IoT, standard organizations and bodies and other IoT technology alliances, low power IoT protocols, IoT Platform components, and finally gives a short description to one of IoT low power application protocols (MQTT).
The implementation of Internet of Cloud needs a broad vision of technology and computing. It
requires the incorporation of diverse technologies in order to realize its working. Cloud computing is
enabling the use of IoT in wide application areas. Its natural feature of being readily available is showing
tremendous advantages in Internet of Things and smart functionalities. However, there are a few aspects of
using cloud services in the IoT mainly revolving around data security and access policies. This paper
presents a perspective on this side of cloud usage and how it can be handled proficiently. A detailed study
and evaluation of selective security issues has been done to help the reader get acquainted with this side of
cloud in IoT.
This document discusses machine-to-machine (M2M) technology and how it differs from the Internet of Things (IoT). M2M refers to direct communication between machines without human involvement by using sensors, wireless networks, and centralized data collection. Key applications of M2M discussed include smart homes that remotely control appliances, healthcare monitoring of patients, retail management with digital signage and payment, and manufacturing process optimization with networked sensors. The main difference between M2M and IoT is that IoT uses both centralized and distributed network architectures while M2M only utilizes a centralized structure.
Performance Analysis of Internet of Things Protocols Based Fog/Cloud over Hig...Istabraq M. Al-Joboury
The Internet of Things (IoT) becomes the future of a global data field in which the embedded devices communicate with each other, exchange data and making decisions through the Internet. IoT could improves the qualityoflife in smart cities, but a massive amount of data from different smart devices could slow down or crash database systems. In addition, IoT data transfer to Cloud for monitoring information and generating feedback thus will lead to highdelay in infrastructure level. Fog Computing can help by offering services closer to edge devices. In this paper, we propose an efficient system architecture to mitigate the problem of delay. We provide performance analysis like responsetime, throughput and packet loss for MQTT (Message Queue Telemetry Transport) and HTTP (Hyper Text Transfer Protocol) protocols based on Cloud or Fog serverswith large volume of data form emulated traffic generator working alongsidewith one real sensor. We implement both protocols in the same architecture, with low cost embedded devices to local and Cloud servers with different platforms. The results show that HTTP response time is 12.1 and 4.76 times higher than MQTT Fog and cloud based located in the same geographical area of the sensors respectively. The worst case in performance is observed when the Cloud is public and outside the country region. The results obtained for throughput shows that MQTT has the capability to carry the data with available bandwidth and lowest percentage of packet loss. We also prove that the proposed Fog architecture is an efficient way to reduce latency and enhance performance in Cloud based IoT.
This document provides an overview of the Internet of Things (IoT). It discusses the history and concept of IoT, how IoT systems work, applications of IoT, the current state and future prospects. It also outlines key research areas like artificial intelligence and machine learning in IoT. The document details the typical architecture layers in an IoT system and new wireless technologies used in IoT like ZigBee, SigFox, and LTE-M. Finally, it discusses some criticisms, problems and controversies with IoT including issues around security, platform fragmentation, privacy and data storage.
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGSIJNSA Journal
The idea to connect everything to anything and at any point of time is what vaguely defines the concept of
the Internet of Things (IoT). The IoT is not only about providing connectivity but also facilitating
interaction among these connected things. Though the term IoT was introduced in 1999 but has drawn
significant attention during the past few years, the pace at which new devices are being integrated into the
system will profoundly impact the world in a good way but also poses some severe queries about security
and privacy. IoT in its current form is susceptible to a multitudinous set of attacks. One of the most
significant concerns of IoT is to provide security assurance for the data exchange because data is
vulnerable to some attacks by the attackers at each layer of IoT. The IoT has a layered structure where
each layer provides a service. The security needs vary from layer to layer as each layer serves a different
purpose. This paper aims to analyze the various security and privacy threats related to IoT. Some attacks
have been discussed along with some existing and proposed countermeasures.
A review on orchestration distributed systems for IoT smart services in fog c...IJECEIAES
This paper provides a review of orchestration distributed systems for IoT smart services in fog computing. The cloud infrastructure alone cannot handle the flow of information with the abundance of data, devices and interactions. Thus, fog computing becomes a new paradigm to overcome the problem. One of the first challenges was to build the orchestration systems to activate the clouds and to execute tasks throughout the whole system that has to be considered to the situation in the large scale of geographical distance, heterogeneity and low latency to support the limitation of cloud computing. Some problems exist for orchestration distributed in fog computing are to fulfil with high reliability and low-delay requirements in the IoT applications system and to form a larger computer network like a fog network, at different geographic sites. This paper reviewed approximately 68 articles on orchestration distributed system for fog computing. The result shows the orchestration distribute system and some of the evaluation criteria for fog computing that have been compared in terms of Borg, Kubernetes, Swarm, Mesos, Aurora, heterogeneity, QoS management, scalability, mobility, federation, and interoperability. The significance of this study is to support the researcher in developing orchestration distributed systems for IoT smart services in fog computing focus on IR4.0 national agenda.
Internet Of Things(IoT) is emerging technology in future world.The term IoT comprises of Cloud computing, Data mining,
Big data analytics, hardware board. The Security and Interoperability is a main factor that influences the IoT Enegy
consumption is also main fator for IoT application designing.The various protocols such as MQTT,AMQP,XMPP are used in
IoT.This paper analysis the various protocols used in Internet of Things.
The document discusses the key components of an Internet of Things (IoT) architecture. It describes the five layers of an IoT architecture: perception layer, object abstraction layer, service management layer, application layer, and business layer. It also discusses the key elements that enable IoT such as things, gateways, data streaming processors, data lakes, data warehouses, data analysts, machine learning models, and control applications. Security is an important consideration for IoT architectures and the requirements vary across the different layers.
Cloud computing is a new technology which refers to an infrastructure where both software and hardware application are operate for the network with the help of internet. Cloud computing provide these services with the help of rule know as you pay as you go on. Internet of things (IoT) is a new technology which is growing rapidly in the field of telecommunications. The aim of IoT devices is to connect all things around us to the internet and thus provide us with smarter cities, intelligent homes and generally more comfortable lives. The combation of cloud computing and IoT devices make rapid development of both technologies. In this paper, we present information about IoT and cloud computing with a focus on the security issues of both technologies. Concluding we present the contribution of cloud computing to the IoT technology. Thus, it shows how the cloud computing technology improves the function of the IoT. Finally present the security challenges of both technologies IoT and cloud computing.
Implementation of IoT in Agriculture: A Scientific Approach for Smart Irriga...Springer
This document describes an IoT-based smart irrigation prototype that was designed and implemented. The prototype automatically turns a motor pump on and off based on soil moisture levels, taking into account temperature and humidity. It uses an ESP32 microcontroller connected to DHT11 and moisture sensors. The data is sent to the Arduino IoT cloud via MQTT protocol and can be accessed worldwide. Test data from the prototype over the cloud and locally is presented. The document also provides background on IoT architectures and protocols, and discusses related work on smart agriculture applications using IoT and machine learning.
internet of things(Architecture and components).pptxvikramkagitapu
The term IoT, or Internet of Things, refers to the collective network of connected devices and the technology that facilitates communication between devices and the cloud, as well as between the devices themselves
Hybrid NarrowBand-internet of things protocol for real time data optimization IJECEIAES
The level of dependence on data communication in the modern era is increasing exponentially. The internet of things (IoT) plays a very important role in the advancement of the industrial revolution 4.0 that utilizes data communication systems. IoT deployments require data communication protocols, such as hypertext transfer protocol (HTTP), and message queuing telemetry transport (MQTT) as well as network communication protocols (wireless) to meet the network needs of devices with limited resources. Optimization of data communication in IoT is needed to maintain the quality of sending and receiving data in real time. This research proposes a hybrid NarrowBand-IoT (NB-IoT) protocol designed using NarrowBand communication network technology with optimization of data communication using MQTT and HTTP protocols. In this research, the hybrid NB-IoT protocol has the best packet loss value of 0.010% against the HTTP NB-IoT protocol which has a value of 0.017%, and the MQTT NB-IoT protocol of 0.024%. The hybrid NB-IoT protocol has a latency value of 8.7 seconds compared to the HTTP NB-IoT protocol which has a latency of 10.9 seconds. Meanwhile, the throughput value of the hybrid NB-IoT protocol is 158906.1 byte/s and is better than the MQTT NB-IoT protocol which is only 158898.6 bytes/s.
The Role of Cloud-MANET Framework in the Internet of Things (IoT)AlAtfat
In the next generation of computing, Mobile ad-hoc network
(MANET) will play a very important role in the Internet of Things (IoT). The
MANET is a kind of wireless networks that are self-organizing and auto
connected in a decentralized system. Every device in MANET can be moved
freely from one location to another in any direction. They can create a network
with their neighbors’ smart devices and forward data to another device. The IoTCloud-MANET framework of smart devices is composed of IoT, cloud
computing, and MANET. This framework can access and deliver cloud services
to the MANET users through their smart devices in the IoT framework where all
computations, data handling, and resource management are performed. The smart
devices can move from one location to another within the range of the MANET
network. Various MANETs can connect to the same cloud, they can use cloud
service in a real time. For connecting the smart device of MANET to cloud needs
integration with mobile apps. My main contribution in this research links a new
methodology for providing secure communication on the internet of smart
devices using MANET Concept in 5G. The research methodology uses the
correct and efficient simulation of the desired study and can be implemented in a
framework of the Internet of Things in 5G.
This document provides an overview of the Internet of Things (IoT). It begins by defining IoT and describing its key features such as artificial intelligence, connectivity, sensors, active engagement, and use of small devices. It then explains how IoT works and describes its architecture which includes sensing, network, data processing, and application layers. The document discusses the history of IoT and provides examples of its applications in various domains like smart homes, healthcare, transportation, and agriculture. It also outlines some of the pros and cons of IoT such as improved customer engagement but also security and privacy risks. In the end, the document discusses some IoT tools and platforms.
This document provides an overview of the Internet of Things (IoT), including definitions, characteristics, and the physical and logical design of IoT systems. It defines IoT as a network that connects devices to the internet to exchange data and communicate. The key characteristics are intelligence, heterogeneity, dynamic changes, enormous scale, safety/security, and connectivity. The physical design includes IoT devices, protocols for communication between devices and cloud servers, and the layers of the network including physical, link, network, transport and application layers. The logical design describes functional blocks, communication models like request-response and publish-subscribe, and APIs including REST and WebSocket-based APIs.
Internet of things: review, architecture and applicationsCSITiaesprime
Devices linked to the internet of things (IoT) may communicate with one another in several settings. Furthermore, rather of relying on an existing centralized system, users may develop their own network by using wireless capabilities. This kind of network is known as a wireless mobile ad hoc network. The mobile ad-hoc network (MANET) enables IoT devices to connect with one another in an unstructured networked environment. IoT devices may connect, establish linkages, and share data on a continuous basis. In this system, the cloud's purpose is to store and analyze data acquired from IoT devices. One of the most significant challenges in cloud computing has been identified as information security, and its resolution will result in an even bigger increase in cloud computing usage and popularity in the future. Finally, the goal of this project is to create a framework for facilitating communication between IoT devices in a Cloud and MANET context. Our major contribution is a ground-breaking research initiative that combines cloud computing with the MANET and connects the internet of things. This research might be used to the IoT in the future.
Lightweight IoT middleware for rapid application developmentTELKOMNIKA JOURNAL
Sensors connected to the cloud services equipped with data analytics has created a plethora of new type of applications ranging from personal to an industrial level forming to what is known today as Internet of Things (IoT). IoT-based system follows a pattern of data collection, data analytics, automation, and system improvement recommendations. However, most applications would have its own unique requirements in terms of the type of the smart devices, communication technologies as well as its application provisioning service. In order to enable an IoT-based system, various services are commercially available that provide services such as backend-as-a-service (BaaS) and software-as-a-service (SaaS) hosted in the cloud. This, in turn, raises the issues of security and privacy. However there is no plug-and-play IoT middleware framework that could be deployed out of the box for on-premise server. This paper aims at providing a lightweight IoT middleware that can be used to enable IoT applications owned by the individuals or organizations that effectively securing the data on-premise or in remote server. Specifically, the middleware with a standardized application programming interface (API) that could adapt to the application requirements through high level abstraction and interacts with the application service provider is proposed. Each API endpoint would be secured using Access Control List (ACL) and easily integratable with any other modules to ensure the scalability of the system as well as easing system deployment. In addition, this middleware could be deployed in a distributed manner and coordinate among themselves to fulfil the application requirements. A middleware is presented in this paper with GET and POST requests that are lightweight in size with a footprint of less than 1 KB and a round trip time of less than 1 second to facilitate rapid application development by individuals or organizations for securing IoT resources.
Understanding Architecture of Internet of ThingsIJSRED
The document discusses the architecture of the Internet of Things (IoT). It begins by introducing IoT and its key components. It then discusses three traditional IoT architectures: (1) a three-layer architecture consisting of a perception, network and application layer; (2) the TCP/IP four-layer model; and (3) the Telecommunications Management Network's five-layer logical layered architecture. The document proposes a new five-layer IoT architecture combining aspects of these models. The five layers are the business, application, processing, transport and perception layers. The perception layer collects data via sensors while the business layer manages the overall enterprise.
30 9137 e implementation of cloud connected smart plug (edit lafi)IAESIJEECS
This document describes the implementation of a cloud-connected smart plug with energy monitoring capabilities. The smart plug allows users to monitor and control up to six electrical appliances remotely using a smartphone. It uses sensors to measure energy consumption of connected devices in real-time. The plug connects to the cloud using Wi-Fi to enable remote monitoring and control via a mobile app. Users can schedule devices to turn on and off automatically and detect occupancy to reduce wasted energy. The system provides real-time energy monitoring of home appliances through an IoT approach integrating sensors, microcontrollers, cloud services and mobile applications.
IRJET- Home Automation using IoT: ReviewIRJET Journal
This document summarizes research on using Internet of Things (IoT) technology for home automation and security. It discusses how IoT allows devices in the home to be controlled remotely through a smartphone app and can automate tasks. The document also reviews different approaches others have taken to implement smart home security systems using sensors and microcontrollers connected to the Internet. It describes the typical architecture of an IoT system including sensor, network, and application layers. Finally, it summarizes several research papers on developing smart home and kitchen monitoring systems using technologies like Arduino, Raspberry Pi, and sensors for functions like detecting fires, gas leaks, and intruders.
The document discusses the Internet of Things (IoT). It provides definitions of IoT from various organizations and describes IoT as a network of physical devices embedded with sensors, software and network connectivity. These devices can collect and exchange data over the internet without human interaction. The document outlines the key components of IoT including sensing devices, network connectivity, data processing and applications. It also discusses the architecture of IoT devices and describes the various layers involved. Examples of application areas for IoT such as smart homes, healthcare and agriculture are provided. The benefits and challenges of IoT are summarized.
This document provides an overview of Internet of Things (IoT) technologies, including enabling elements, common standards, challenges, and applications. It discusses the IoT architecture in five layers from objects to business. Key enabling technologies include identification, sensing, communication protocols, and computation. Example applications discussed are smart homes, buildings, transportation and healthcare. The document outlines its contributions and provides a detailed survey of IoT topics.
The document provides an overview of the Internet of Things (IoT). It discusses the history and definition of IoT, as well as key enabling technologies like miniaturization, sensors, IPv6, gateways, cloud computing, and wireless connectivity. The document also outlines the typical layers of an IoT architecture including the sensor, gateway/network, management service, and application layers. Challenges of IoT are noted and Philips Hue light is given as an example. Finally, IoT platforms and benefits like improved customer engagement and technical optimization are mentioned.
The document discusses the integration of Internet of Things (IoT) and cloud computing, referred to as Cloud of Things. It identifies several key issues with this integration, such as protocol support, energy efficiency, resource allocation, identity management, and security/privacy. Potential solutions are provided for some of the issues. The conclusion discusses the need for more study on the impact of these issues based on the specific IoT application and services provided.
This document proposes a campus edge computing network based on IoT street lighting nodes. It aims to address the issue of inadequate network resources on campus from the increasing number of IoT devices and data streams. The system employs street lights as decentralized edge computing nodes that connect IoT devices, collect and process sensor data, and communicate with the campus cloud platform. The cloud platform uses neural network algorithms to predict network resource requirements, analyze the workload of each service, and efficiently allocate resources across the campus network to maintain quality of service as the number of IoTs grows. Experimental results showed the approach reduces cloud loading and can dynamically adjust resource distribution for balanced performance.
DNA computing based stream cipher for internet of things using MQTT protocol IJECEIAES
Internet of Things (IoT) is a rapidly developing technology that enables “devices” to communicate and share information amongst them without human control. The devices have the features of internet connectivity and networking. Due to the increasing demands of a secure environment in IoT application, security has become a crucial aspect on which researchers have been increasingly focused. Connecting devices to the internet can facilitate intruders to attack devices as they can access the data from anywhere in the globe. In this work, an encryption–decryption process-based stream cipher has been used. The messages between IoT nodes were encrypted using One Time Pad (OTP) and DNA computing. Furthermore, the required key sequence was generated using a linear feedback shift register (LFSR) as a pseudo number key generator. This key sequence was combined to generate a unique key for each message. The algorithm was implemented using source python and tested on a Raspberry pi under Linux open operation system.
Similar to Bridging IoT infrastructure and cloud application using cellular-based internet gateway device (20)
Amazon products reviews classification based on machine learning, deep learni...TELKOMNIKA JOURNAL
In recent times, the trend of online shopping through e-commerce stores and websites has grown to a huge extent. Whenever a product is purchased on an e-commerce platform, people leave their reviews about the product. These reviews are very helpful for the store owners and the product’s manufacturers for the betterment of their work process as well as product quality. An automated system is proposed in this work that operates on two datasets D1 and D2 obtained from Amazon. After certain preprocessing steps, N-gram and word embedding-based features are extracted using term frequency-inverse document frequency (TF-IDF), bag of words (BoW) and global vectors (GloVe), and Word2vec, respectively. Four machine learning (ML) models support vector machines (SVM), logistic regression (RF), logistic regression (LR), multinomial Naïve Bayes (MNB), two deep learning (DL) models convolutional neural network (CNN), long-short term memory (LSTM), and standalone bidirectional encoder representations (BERT) are used to classify reviews as either positive or negative. The results obtained by the standard ML, DL models and BERT are evaluated using certain performance evaluation measures. BERT turns out to be the best-performing model in the case of D1 with an accuracy of 90% on features derived by word embedding models while the CNN provides the best accuracy of 97% upon word embedding features in the case of D2. The proposed model shows better overall performance on D2 as compared to D1.
Design, simulation, and analysis of microstrip patch antenna for wireless app...TELKOMNIKA JOURNAL
In this study, a microstrip patch antenna that works at 3.6 GHz was built and tested to see how well it works. In this work, Rogers RT/Duroid 5880 has been used as the substrate material, with a dielectric permittivity of 2.2 and a thickness of 0.3451 mm; it serves as the base for the examined antenna. The computer simulation technology (CST) studio suite is utilized to show the recommended antenna design. The goal of this study was to get a more extensive transmission capacity, a lower voltage standing wave ratio (VSWR), and a lower return loss, but the main goal was to get a higher gain, directivity, and efficiency. After simulation, the return loss, gain, directivity, bandwidth, and efficiency of the supplied antenna are found to be -17.626 dB, 9.671 dBi, 9.924 dBi, 0.2 GHz, and 97.45%, respectively. Besides, the recreation uncovered that the transfer speed side-lobe level at phi was much better than those of the earlier works, at -28.8 dB, respectively. Thus, it makes a solid contender for remote innovation and more robust communication.
Design and simulation an optimal enhanced PI controller for congestion avoida...TELKOMNIKA JOURNAL
This document describes using a snake optimization algorithm to tune the gains of an enhanced proportional-integral controller for congestion avoidance in a TCP/AQM system. The controller aims to maintain a stable and desired queue size without noise or transmission problems. A linearized model of the TCP/AQM system is presented. An enhanced PI controller combining nonlinear gain and original PI gains is proposed. The snake optimization algorithm is then used to tune the parameters of the enhanced PI controller to achieve optimal system performance and response. Simulation results are discussed showing the proposed controller provides a stable and robust behavior for congestion control.
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...TELKOMNIKA JOURNAL
Vehicular ad-hoc networks (VANETs) are wireless-equipped vehicles that form networks along the road. The security of this network has been a major challenge. The identity-based cryptosystem (IBC) previously used to secure the networks suffers from membership authentication security features. This paper focuses on improving the detection of intruders in VANETs with a modified identity-based cryptosystem (MIBC). The MIBC is developed using a non-singular elliptic curve with Lagrange interpolation. The public key of vehicles and roadside units on the network are derived from number plates and location identification numbers, respectively. Pseudo-identities are used to mask the real identity of users to preserve their privacy. The membership authentication mechanism ensures that only valid and authenticated members of the network are allowed to join the network. The performance of the MIBC is evaluated using intrusion detection ratio (IDR) and computation time (CT) and then validated with the existing IBC. The result obtained shows that the MIBC recorded an IDR of 99.3% against 94.3% obtained for the existing identity-based cryptosystem (EIBC) for 140 unregistered vehicles attempting to intrude on the network. The MIBC shows lower CT values of 1.17 ms against 1.70 ms for EIBC. The MIBC can be used to improve the security of VANETs.
Conceptual model of internet banking adoption with perceived risk and trust f...TELKOMNIKA JOURNAL
Understanding the primary factors of internet banking (IB) acceptance is critical for both banks and users; nevertheless, our knowledge of the role of users’ perceived risk and trust in IB adoption is limited. As a result, we develop a conceptual model by incorporating perceived risk and trust into the technology acceptance model (TAM) theory toward the IB. The proper research emphasized that the most essential component in explaining IB adoption behavior is behavioral intention to use IB adoption. TAM is helpful for figuring out how elements that affect IB adoption are connected to one another. According to previous literature on IB and the use of such technology in Iraq, one has to choose a theoretical foundation that may justify the acceptance of IB from the customer’s perspective. The conceptual model was therefore constructed using the TAM as a foundation. Furthermore, perceived risk and trust were added to the TAM dimensions as external factors. The key objective of this work was to extend the TAM to construct a conceptual model for IB adoption and to get sufficient theoretical support from the existing literature for the essential elements and their relationships in order to unearth new insights about factors responsible for IB adoption.
Efficient combined fuzzy logic and LMS algorithm for smart antennaTELKOMNIKA JOURNAL
The smart antennas are broadly used in wireless communication. The least mean square (LMS) algorithm is a procedure that is concerned in controlling the smart antenna pattern to accommodate specified requirements such as steering the beam toward the desired signal, in addition to placing the deep nulls in the direction of unwanted signals. The conventional LMS (C-LMS) has some drawbacks like slow convergence speed besides high steady state fluctuation error. To overcome these shortcomings, the present paper adopts an adaptive fuzzy control step size least mean square (FC-LMS) algorithm to adjust its step size. Computer simulation outcomes illustrate that the given model has fast convergence rate as well as low mean square error steady state.
Design and implementation of a LoRa-based system for warning of forest fireTELKOMNIKA JOURNAL
This paper presents the design and implementation of a forest fire monitoring and warning system based on long range (LoRa) technology, a novel ultra-low power consumption and long-range wireless communication technology for remote sensing applications. The proposed system includes a wireless sensor network that records environmental parameters such as temperature, humidity, wind speed, and carbon dioxide (CO2) concentration in the air, as well as taking infrared photos.The data collected at each sensor node will be transmitted to the gateway via LoRa wireless transmission. Data will be collected, processed, and uploaded to a cloud database at the gateway. An Android smartphone application that allows anyone to easily view the recorded data has been developed. When a fire is detected, the system will sound a siren and send a warning message to the responsible personnel, instructing them to take appropriate action. Experiments in Tram Chim Park, Vietnam, have been conducted to verify and evaluate the operation of the system.
Wavelet-based sensing technique in cognitive radio networkTELKOMNIKA JOURNAL
Cognitive radio is a smart radio that can change its transmitter parameter based on interaction with the environment in which it operates. The demand for frequency spectrum is growing due to a big data issue as many Internet of Things (IoT) devices are in the network. Based on previous research, most frequency spectrum was used, but some spectrums were not used, called spectrum hole. Energy detection is one of the spectrum sensing methods that has been frequently used since it is easy to use and does not require license users to have any prior signal understanding. But this technique is incapable of detecting at low signal-to-noise ratio (SNR) levels. Therefore, the wavelet-based sensing is proposed to overcome this issue and detect spectrum holes. The main objective of this work is to evaluate the performance of wavelet-based sensing and compare it with the energy detection technique. The findings show that the percentage of detection in wavelet-based sensing is 83% higher than energy detection performance. This result indicates that the wavelet-based sensing has higher precision in detection and the interference towards primary user can be decreased.
A novel compact dual-band bandstop filter with enhanced rejection bandsTELKOMNIKA JOURNAL
In this paper, we present the design of a new wide dual-band bandstop filter (DBBSF) using nonuniform transmission lines. The method used to design this filter is to replace conventional uniform transmission lines with nonuniform lines governed by a truncated Fourier series. Based on how impedances are profiled in the proposed DBBSF structure, the fractional bandwidths of the two 10 dB-down rejection bands are widened to 39.72% and 52.63%, respectively, and the physical size has been reduced compared to that of the filter with the uniform transmission lines. The results of the electromagnetic (EM) simulation support the obtained analytical response and show an improved frequency behavior.
Deep learning approach to DDoS attack with imbalanced data at the application...TELKOMNIKA JOURNAL
A distributed denial of service (DDoS) attack is where one or more computers attack or target a server computer, by flooding internet traffic to the server. As a result, the server cannot be accessed by legitimate users. A result of this attack causes enormous losses for a company because it can reduce the level of user trust, and reduce the company’s reputation to lose customers due to downtime. One of the services at the application layer that can be accessed by users is a web-based lightweight directory access protocol (LDAP) service that can provide safe and easy services to access directory applications. We used a deep learning approach to detect DDoS attacks on the CICDDoS 2019 dataset on a complex computer network at the application layer to get fast and accurate results for dealing with unbalanced data. Based on the results obtained, it is observed that DDoS attack detection using a deep learning approach on imbalanced data performs better when implemented using synthetic minority oversampling technique (SMOTE) method for binary classes. On the other hand, the proposed deep learning approach performs better for detecting DDoS attacks in multiclass when implemented using the adaptive synthetic (ADASYN) method.
The appearance of uncertainties and disturbances often effects the characteristics of either linear or nonlinear systems. Plus, the stabilization process may be deteriorated thus incurring a catastrophic effect to the system performance. As such, this manuscript addresses the concept of matching condition for the systems that are suffering from miss-match uncertainties and exogeneous disturbances. The perturbation towards the system at hand is assumed to be known and unbounded. To reach this outcome, uncertainties and their classifications are reviewed thoroughly. The structural matching condition is proposed and tabulated in the proposition 1. Two types of mathematical expressions are presented to distinguish the system with matched uncertainty and the system with miss-matched uncertainty. Lastly, two-dimensional numerical expressions are provided to practice the proposed proposition. The outcome shows that matching condition has the ability to change the system to a design-friendly model for asymptotic stabilization.
Implementation of FinFET technology based low power 4×4 Wallace tree multipli...TELKOMNIKA JOURNAL
Many systems, including digital signal processors, finite impulse response (FIR) filters, application-specific integrated circuits, and microprocessors, use multipliers. The demand for low power multipliers is gradually rising day by day in the current technological trend. In this study, we describe a 4×4 Wallace multiplier based on a carry select adder (CSA) that uses less power and has a better power delay product than existing multipliers. HSPICE tool at 16 nm technology is used to simulate the results. In comparison to the traditional CSA-based multiplier, which has a power consumption of 1.7 µW and power delay product (PDP) of 57.3 fJ, the results demonstrate that the Wallace multiplier design employing CSA with first zero finding logic (FZF) logic has the lowest power consumption of 1.4 µW and PDP of 27.5 fJ.
Evaluation of the weighted-overlap add model with massive MIMO in a 5G systemTELKOMNIKA JOURNAL
The flaw in 5G orthogonal frequency division multiplexing (OFDM) becomes apparent in high-speed situations. Because the doppler effect causes frequency shifts, the orthogonality of OFDM subcarriers is broken, lowering both their bit error rate (BER) and throughput output. As part of this research, we use a novel design that combines massive multiple input multiple output (MIMO) and weighted overlap and add (WOLA) to improve the performance of 5G systems. To determine which design is superior, throughput and BER are calculated for both the proposed design and OFDM. The results of the improved system show a massive improvement in performance ver the conventional system and significant improvements with massive MIMO, including the best throughput and BER. When compared to conventional systems, the improved system has a throughput that is around 22% higher and the best performance in terms of BER, but it still has around 25% less error than OFDM.
Reflector antenna design in different frequencies using frequency selective s...TELKOMNIKA JOURNAL
In this study, it is aimed to obtain two different asymmetric radiation patterns obtained from antennas in the shape of the cross-section of a parabolic reflector (fan blade type antennas) and antennas with cosecant-square radiation characteristics at two different frequencies from a single antenna. For this purpose, firstly, a fan blade type antenna design will be made, and then the reflective surface of this antenna will be completed to the shape of the reflective surface of the antenna with the cosecant-square radiation characteristic with the frequency selective surface designed to provide the characteristics suitable for the purpose. The frequency selective surface designed and it provides the perfect transmission as possible at 4 GHz operating frequency, while it will act as a band-quenching filter for electromagnetic waves at 5 GHz operating frequency and will be a reflective surface. Thanks to this frequency selective surface to be used as a reflective surface in the antenna, a fan blade type radiation characteristic at 4 GHz operating frequency will be obtained, while a cosecant-square radiation characteristic at 5 GHz operating frequency will be obtained.
Reagentless iron detection in water based on unclad fiber optical sensorTELKOMNIKA JOURNAL
A simple and low-cost fiber based optical sensor for iron detection is demonstrated in this paper. The sensor head consist of an unclad optical fiber with the unclad length of 1 cm and it has a straight structure. Results obtained shows a linear relationship between the output light intensity and iron concentration, illustrating the functionality of this iron optical sensor. Based on the experimental results, the sensitivity and linearity are achieved at 0.0328/ppm and 0.9824 respectively at the wavelength of 690 nm. With the same wavelength, other performance parameters are also studied. Resolution and limit of detection (LOD) are found to be 0.3049 ppm and 0.0755 ppm correspondingly. This iron sensor is advantageous in that it does not require any reagent for detection, enabling it to be simpler and cost-effective in the implementation of the iron sensing.
Impact of CuS counter electrode calcination temperature on quantum dot sensit...TELKOMNIKA JOURNAL
In place of the commercial Pt electrode used in quantum sensitized solar cells, the low-cost CuS cathode is created using electrophoresis. High resolution scanning electron microscopy and X-ray diffraction were used to analyze the structure and morphology of structural cubic samples with diameters ranging from 40 nm to 200 nm. The conversion efficiency of solar cells is significantly impacted by the calcination temperatures of cathodes at 100 °C, 120 °C, 150 °C, and 180 °C under vacuum. The fluorine doped tin oxide (FTO)/CuS cathode electrode reached a maximum efficiency of 3.89% when it was calcined at 120 °C. Compared to other temperature combinations, CuS nanoparticles crystallize at 120 °C, which lowers resistance while increasing electron lifetime.
In place of the commercial Pt electrode used in quantum sensitized solar cells, the low-cost CuS cathode is created using electrophoresis. High resolution scanning electron microscopy and X-ray diffraction were used to analyze the structure and morphology of structural cubic samples with diameters ranging from 40 nm to 200 nm. The conversion efficiency of solar cells is significantly impacted by the calcination temperatures of cathodes at 100 °C, 120 °C, 150 °C, and 180 °C under vacuum. The fluorine doped tin oxide (FTO)/CuS cathode electrode reached a maximum efficiency of 3.89% when it was calcined at 120 °C. Compared to other temperature combinations, CuS nanoparticles crystallize at 120 °C, which lowers resistance while increasing electron lifetime.
A progressive learning for structural tolerance online sequential extreme lea...TELKOMNIKA JOURNAL
This article discusses the progressive learning for structural tolerance online sequential extreme learning machine (PSTOS-ELM). PSTOS-ELM can save robust accuracy while updating the new data and the new class data on the online training situation. The robustness accuracy arises from using the householder block exact QR decomposition recursive least squares (HBQRD-RLS) of the PSTOS-ELM. This method is suitable for applications that have data streaming and often have new class data. Our experiment compares the PSTOS-ELM accuracy and accuracy robustness while data is updating with the batch-extreme learning machine (ELM) and structural tolerance online sequential extreme learning machine (STOS-ELM) that both must retrain the data in a new class data case. The experimental results show that PSTOS-ELM has accuracy and robustness comparable to ELM and STOS-ELM while also can update new class data immediately.
Electroencephalography-based brain-computer interface using neural networksTELKOMNIKA JOURNAL
This study aimed to develop a brain-computer interface that can control an electric wheelchair using electroencephalography (EEG) signals. First, we used the Mind Wave Mobile 2 device to capture raw EEG signals from the surface of the scalp. The signals were transformed into the frequency domain using fast Fourier transform (FFT) and filtered to monitor changes in attention and relaxation. Next, we performed time and frequency domain analyses to identify features for five eye gestures: opened, closed, blink per second, double blink, and lookup. The base state was the opened-eyes gesture, and we compared the features of the remaining four action gestures to the base state to identify potential gestures. We then built a multilayer neural network to classify these features into five signals that control the wheelchair’s movement. Finally, we designed an experimental wheelchair system to test the effectiveness of the proposed approach. The results demonstrate that the EEG classification was highly accurate and computationally efficient. Moreover, the average performance of the brain-controlled wheelchair system was over 75% across different individuals, which suggests the feasibility of this approach.
Adaptive segmentation algorithm based on level set model in medical imagingTELKOMNIKA JOURNAL
For image segmentation, level set models are frequently employed. It offer best solution to overcome the main limitations of deformable parametric models. However, the challenge when applying those models in medical images stills deal with removing blurs in image edges which directly affects the edge indicator function, leads to not adaptively segmenting images and causes a wrong analysis of pathologies wich prevents to conclude a correct diagnosis. To overcome such issues, an effective process is suggested by simultaneously modelling and solving systems’ two-dimensional partial differential equations (PDE). The first PDE equation allows restoration using Euler’s equation similar to an anisotropic smoothing based on a regularized Perona and Malik filter that eliminates noise while preserving edge information in accordance with detected contours in the second equation that segments the image based on the first equation solutions. This approach allows developing a new algorithm which overcome the studied model drawbacks. Results of the proposed method give clear segments that can be applied to any application. Experiments on many medical images in particular blurry images with high information losses, demonstrate that the developed approach produces superior segmentation results in terms of quantity and quality compared to other models already presented in previeous works.
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...TELKOMNIKA JOURNAL
Drug addiction is a complex neurobiological disorder that necessitates comprehensive treatment of both the body and mind. It is categorized as a brain disorder due to its impact on the brain. Various methods such as electroencephalography (EEG), functional magnetic resonance imaging (FMRI), and magnetoencephalography (MEG) can capture brain activities and structures. EEG signals provide valuable insights into neurological disorders, including drug addiction. Accurate classification of drug addiction from EEG signals relies on appropriate features and channel selection. Choosing the right EEG channels is essential to reduce computational costs and mitigate the risk of overfitting associated with using all available channels. To address the challenge of optimal channel selection in addiction detection from EEG signals, this work employs the shuffled frog leaping algorithm (SFLA). SFLA facilitates the selection of appropriate channels, leading to improved accuracy. Wavelet features extracted from the selected input channel signals are then analyzed using various machine learning classifiers to detect addiction. Experimental results indicate that after selecting features from the appropriate channels, classification accuracy significantly increased across all classifiers. Particularly, the multi-layer perceptron (MLP) classifier combined with SFLA demonstrated a remarkable accuracy improvement of 15.78% while reducing time complexity.
VARIABLE FREQUENCY DRIVE. VFDs are widely used in industrial applications for...PIMR BHOPAL
Variable frequency drive .A Variable Frequency Drive (VFD) is an electronic device used to control the speed and torque of an electric motor by varying the frequency and voltage of its power supply. VFDs are widely used in industrial applications for motor control, providing significant energy savings and precise motor operation.
Discover the latest insights on Data Driven Maintenance with our comprehensive webinar presentation. Learn about traditional maintenance challenges, the right approach to utilizing data, and the benefits of adopting a Data Driven Maintenance strategy. Explore real-world examples, industry best practices, and innovative solutions like FMECA and the D3M model. This presentation, led by expert Jules Oudmans, is essential for asset owners looking to optimize their maintenance processes and leverage digital technologies for improved efficiency and performance. Download now to stay ahead in the evolving maintenance landscape.
Build the Next Generation of Apps with the Einstein 1 Platform.
Rejoignez Philippe Ozil pour une session de workshops qui vous guidera à travers les détails de la plateforme Einstein 1, l'importance des données pour la création d'applications d'intelligence artificielle et les différents outils et technologies que Salesforce propose pour vous apporter tous les bénéfices de l'IA.
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...IJECEIAES
Medical image analysis has witnessed significant advancements with deep learning techniques. In the domain of brain tumor segmentation, the ability to
precisely delineate tumor boundaries from magnetic resonance imaging (MRI)
scans holds profound implications for diagnosis. This study presents an ensemble convolutional neural network (CNN) with transfer learning, integrating
the state-of-the-art Deeplabv3+ architecture with the ResNet18 backbone. The
model is rigorously trained and evaluated, exhibiting remarkable performance
metrics, including an impressive global accuracy of 99.286%, a high-class accuracy of 82.191%, a mean intersection over union (IoU) of 79.900%, a weighted
IoU of 98.620%, and a Boundary F1 (BF) score of 83.303%. Notably, a detailed comparative analysis with existing methods showcases the superiority of
our proposed model. These findings underscore the model’s competence in precise brain tumor localization, underscoring its potential to revolutionize medical
image analysis and enhance healthcare outcomes. This research paves the way
for future exploration and optimization of advanced CNN models in medical
imaging, emphasizing addressing false positives and resource efficiency.
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...IJECEIAES
Climate change's impact on the planet forced the United Nations and governments to promote green energies and electric transportation. The deployments of photovoltaic (PV) and electric vehicle (EV) systems gained stronger momentum due to their numerous advantages over fossil fuel types. The advantages go beyond sustainability to reach financial support and stability. The work in this paper introduces the hybrid system between PV and EV to support industrial and commercial plants. This paper covers the theoretical framework of the proposed hybrid system including the required equation to complete the cost analysis when PV and EV are present. In addition, the proposed design diagram which sets the priorities and requirements of the system is presented. The proposed approach allows setup to advance their power stability, especially during power outages. The presented information supports researchers and plant owners to complete the necessary analysis while promoting the deployment of clean energy. The result of a case study that represents a dairy milk farmer supports the theoretical works and highlights its advanced benefits to existing plants. The short return on investment of the proposed approach supports the paper's novelty approach for the sustainable electrical system. In addition, the proposed system allows for an isolated power setup without the need for a transmission line which enhances the safety of the electrical network
Generative AI Use cases applications solutions and implementation.pdfmahaffeycheryld
Generative AI solutions encompass a range of capabilities from content creation to complex problem-solving across industries. Implementing generative AI involves identifying specific business needs, developing tailored AI models using techniques like GANs and VAEs, and integrating these models into existing workflows. Data quality and continuous model refinement are crucial for effective implementation. Businesses must also consider ethical implications and ensure transparency in AI decision-making. Generative AI's implementation aims to enhance efficiency, creativity, and innovation by leveraging autonomous generation and sophisticated learning algorithms to meet diverse business challenges.
https://www.leewayhertz.com/generative-ai-use-cases-and-applications/
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...shadow0702a
This document serves as a comprehensive step-by-step guide on how to effectively use PyCharm for remote debugging of the Windows Subsystem for Linux (WSL) on a local Windows machine. It meticulously outlines several critical steps in the process, starting with the crucial task of enabling permissions, followed by the installation and configuration of WSL.
The guide then proceeds to explain how to set up the SSH service within the WSL environment, an integral part of the process. Alongside this, it also provides detailed instructions on how to modify the inbound rules of the Windows firewall to facilitate the process, ensuring that there are no connectivity issues that could potentially hinder the debugging process.
The document further emphasizes on the importance of checking the connection between the Windows and WSL environments, providing instructions on how to ensure that the connection is optimal and ready for remote debugging.
It also offers an in-depth guide on how to configure the WSL interpreter and files within the PyCharm environment. This is essential for ensuring that the debugging process is set up correctly and that the program can be run effectively within the WSL terminal.
Additionally, the document provides guidance on how to set up breakpoints for debugging, a fundamental aspect of the debugging process which allows the developer to stop the execution of their code at certain points and inspect their program at those stages.
Finally, the document concludes by providing a link to a reference blog. This blog offers additional information and guidance on configuring the remote Python interpreter in PyCharm, providing the reader with a well-rounded understanding of the process.
2. ISSN: 1693-6930
TELKOMNIKA Vol. 17, No. 3, June 2019: 1439-1446
1440
to Cloud system through provided RESTful API web service. Moreover, to measure the
performance of the IGD, parameters such as delay, throughput, scalability and reliability testing
were used.
2. Related Works
There were studies proposing IGD in IoT environment, such as Lee, which proposed an
IoT gateway framework to bridge the semantic gap between raw data in sensor node and
information context in high-level applications [12]. The gateway is equipped with internet access
to connect sensor node in a local network to Cloud systems. Punitha suggested that IoT
gateway should have the capability to pass information from sensor to internet and to take care
of data [11]. Byungseok explained that existing IoT gateway solved the communication problem
between field sensor and Cloud system. Further, he proposed a new feature in the gateway that
supported self-configuration for newly added IoT devices in smart home systems [13]. Qian Zhu
proposed an IGD that bridged smart home’s wireless sensor network (WSN) to the internet
using 2G/G mobile communication [14]. Meanwhile, for bridging Zigbee network and GPRS
network, Hong-jiang proposed IGD that actualized the connection between both network; data
conversion between both was also designed along with a solution to data loss [15]. A smart IoT
gateway proposed by Shang was equipped with 3G/LTE connection along with Ethernet
interface in order to provide different bandwidth requirement using many interfaces [16]. A new
Capillary Network Platform having ability to connect WSN to cellular network was proposed by
Oscar [17]. Previously, a gateway to bring machine-to-machine (M2M) communication between
Capillary Network and 3GPP network was proposed by Shubhranshu [18].
In IoT-based smart home system designed by Kang, 3G connection was used along
with Ethernet to produce centralized control to support IoT-based new smart home system
which integrates information, telecommunication, entertainment, and living systems [19]. On the
other hand, a gateway designed by G. Aloi was deployed in a smartphone in order to meet
interoperability among different standards and communications [20]. An IoT gateway proposed
by Wenlong utilized GPRS, 3G/4G via hardware implementation along with low-power short-
distance wireless interfaces to bring a hardware solution [21]. Several authors has implemented
the IoT gateway using low-cost devices like Arduino, such as Grygoruk [22] and Kim [23]; while
Raspberry Pi was used by Morabito [24] and Pavithra [25].
Figure 1 shows an IoT infrastructure and Cloud data storage in our previous work,
where the IoT infrastructure consists of a middleware and two kinds of sensor nodes. The first is
image sensor node built from Raspberry Pi Zero and camera module. It has a function to
capture and publish images using MQTT protocol to IoT middleware. The second is the humidity
and temperature sensor node built from the DHT22 sensor and NodeMCU ESP8266. It has the
capability to publish data using CoAP and MQTT protocol. The middleware runs on
Raspberry Pi 3. Those three are connected using wireless LAN provided by middleware. On the
other hand, an IoT data storage is also developed to store data from the sensor node for the
further analytical purpose. This system is deployed in a virtual private server located in the
Cloud environment.
Figure 1. IoT infrastructure and cloud data storage
3. TELKOMNIKA ISSN: 1693-6930
Bridging IoT infrastructure and cloud application using... (Eko Sakti Pramukantoro)
1441
3. Proposed Internet Gateway Device
As depicted in Figure 2, IGD acts as a subscriber to retrieve all published data stored in
the middleware. This is done by subscribing all topics registered in Redis. This will take
advantage if the new topic exists, there is no need to add a new topic to the subscriber.
After getting the data, IGD will then send it through HTTP POST method to the RESTful API
web service provided by IoT data storage. After receiving verification for data arrived at IoT data
storage, IGD will flush data related to the previously subscribed topic in the middleware.
This action is necessary to ensure that the next data received from middleware is not the
previous data that have been stored in the IoT data storage. The pseudocode for subscribing to
middleware and sending data to IoT data storage is presented in Figure 3.
Figure 2. Sequence diagram: middleware, IGD, and IoT data storage
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
DEFINE function getTopic()
DO send get topics command to Middleware
RETURN topics
DEFINE function flushTopic()
DO send flush topics command to Middleware
DEFINE function on_receive(data)
SET headers = JSON content-type HTTP headers
DO function sendHTTP(headers,data)
DEFINE sendHTTP(headers,data)
DO connect to webservice
DO send data and headers with HTTP POST
DO function flushTopic()
RETURN HTTP response
DO connect to Middleware
SET topics = DO function getTopic()
FOR each topic in topics
SET on_receive callback = function on_receive(data)
DO subcribe topic
Figure 3. Pseudocode: subscribing and sending data
4. ISSN: 1693-6930
TELKOMNIKA Vol. 17, No. 3, June 2019: 1439-1446
1442
4. Experiment Setup
This section describes how IGD is built and integrated into the IoT environment.
The topics used in this paper are office/roomA13, office/roomA14, and office/roomA15. They
contain data from sensor nodes in campus rooms.
4.1. SIM808
SIM808 module for Raspberry Pi with GPRS network connection is used by this IGD to
be able to connect to the internet. To install the SIM808 module to Raspberry Pi, a scheme
shown in Figure 4 is used. In order to work properly, TX pin from SIM808 is connected to GPIO
pin 10 functioning as RX pin for Raspberry Pi. Then RX pin from SIM808 module is connected
to GPIO pin 8 functioning as TX pin for Raspberry Pi, and the Ground pin from SIM808 module
is connected to GPIO pin 6 functioning as a ground pin in Raspberry Pi. For powering the
SIM808 module, we use a separated power supply from Raspberry Pi providing 12 volts and 1
ampere. A configuration is needed so that SIM808 module can be turned on automatically after
a reboot. We connect D9 pin with one of GPIO digital pin, therefore the command to turn the
SIM808 module on can be done by sending a digital signal through GPIO with a Python-based
program as shown in Figure 5.
Figure 4. GPIO connection scheme
Figure 5. Program to turn on SIM808 module
4.2. Network Topology
After the IGD is configured properly, the next step is integrating it to IoT environment
from the previous work. Its position and the network addressing for this research is depicted in
Figure 6. The IGD uses two interfaces: WLAN (192.168.42.50) for communicating with IoT
device on the intranet and ppp0 (114.125.124.111) for internet connection.
Figure 6. Network addressing
4.3. Sensor Node
This experiment uses three sensor nodes for sensing data. Two of them are
NodeMCU ESP8266 equipped with DHT22 for sensing temperature and humidity. They publish
data in JSON, as shown in Figure 7.
5. TELKOMNIKA ISSN: 1693-6930
Bridging IoT infrastructure and cloud application using... (Eko Sakti Pramukantoro)
1443
{"protocol": "coap", "temperature": {"unit": "celcius", "value": "24.4.4"},
"timestamp": 0, "humidity": {"unit": "%", "value": "59.2.2"}, "topic":
"office/roomA14", "sensor": {"index": 16446677, "tipe": "esp8266", "module":
"dht22", "ip": "192.168.42.50"}}
Figure 7. Semantic data example
The third sensor node is Raspberry Pi Zero with a camera for sensing images in the room
and sending them to the middleware. Figure 8(a) shows the sensor node for capturing temperature
and humidity data, whilst Figure 8(b) shows the sensor node used to capture image data. Each
sensor publishes data on different topics and protocols. In our experiment, we used
“office/roomA13” topic for data from DHT sensor using MQTT, “office/roomA14” topic for data
from DHT sensor using COAP, and “office/roomA15” topic for the captured image published
using MQTT.
(a) NodeMCU+DHT22 (b) Raspberry Pi Zero+camera
Figure 8. Sensor nodes
4.4. Sending the Sensor Data
After the IGD receives data from the middleware, it will send the data to the IoT data
storage through provided RESTful API Web Service. An example result from web service after
IGD sends the data is shown in Figure 9.
Figure 9. IGD sends data to IoT data storage
5. Result and Analysis
Experimental results about performance are presented in this section. This section will
be divided into two parts. Firstly, experiment with scalability scenario. Secondly, experiment with
reliability scenario. The experiment was done by subscribing three topics at the same time:
office/roomA13, office/roomA14, and office/roomA15 then sending it to data storage.
5.1. Scalability Testing
For scalability in delivering data using GPRS, this experiment is done by publishing
topics with several data sizes i.e. 1MB, 2MB, 5MB, and 10MB, which results in delay values as
shown in Figure 10. There is 1144 seconds delay for sending 1MB data, 2287 seconds for 2MB
data, 5696 seconds for 5MB data, and 11398 seconds (3 hours 9 minutes and 58 seconds) for
10MB data. We conducted some tests to receive and send data for 1 hour as seen in Table 1.
6. ISSN: 1693-6930
TELKOMNIKA Vol. 17, No. 3, June 2019: 1439-1446
1444
The results show that packet loss occurs at data sending for office/roomA15 topic, with the
value of 80%. Another result shown is that the average throughput of office/roomA15 topic is
higher than ones of office/roomA13 and office/roomA14 topics.
Figure 10. Delay in delivering various kinds of data size
Table 1. Delivery Ratio
Topic Expected Sent Packet Loss Average Delay Average Throughput
office/roomA13 20 20 0% 2.919225 120.5075484
office/roomA14 20 20 0% 5.818605 84.34177844
office/roomA15 20 4 80% 595.9642 909.6762563
5.2. Reliability Testing
The reliability test was done by sending 10 data, 20 data, 30 data, 40 data, and 50 data
for every topic. Its results show that office/roomA13 topic’s average delay is 5.53 seconds for 10
data, 4.68 seconds for 20 data, 4.28 seconds for 30 data, 5.06 seconds for 40 data, and 4.23
seconds for 50 data. Figure 11 depicts those values. As the throughput results, we get 63.5
bytes per second for 10 data, 58.8 bytes per second for 20 data, 63.5 bytes per second for 30
data, 62.8 bytes per second for 40 data, and 55 bytes per second for 50 data. The values of
throughput for office/roomA13 topic are depicted in Figure 12.
Figure 11. Delay for office/roomA13 topic
Figure 12. Throughput for
office/roomA13 topic
As shown in Figure 13, the delay results of office/roomA14 topic are 3.6 seconds for 10
data, 4.4 seconds for 20 data, 3.9 seconds for 30 data, 5.11 seconds for 40 data, and
4.4 seconds for 50 data. The throughput results are 70.3 bytes per second for 10 data,
59.1 bytes per second for 20 data, 72.8 bytes per second for 30 data, 81.6 bytes per second for
40 data, and 61.62 bytes per second for 50 data, as depicted in Figure 14. The delay results for
office/roomA15 topic show 984.47 seconds for 10 data, 1048.2 seconds for 20 data, 1005
seconds for 30 data, 837 seconds for 40 data, and 706 seconds for 50 data, as shown
in Figure 15. Figure 16 depicts the throughput results for the same topic, which are 891.55 bytes
7. TELKOMNIKA ISSN: 1693-6930
Bridging IoT infrastructure and cloud application using... (Eko Sakti Pramukantoro)
1445
per second for 10 data, 914 bytes per second for 20 data, 911 bytes per second for 30 data,
913 bytes per second for 40 data, and 912 bytes per second for 50 data.
Figure 13. Delay for office/roomA14 topic Figure 14. Throughput for
office/roomA14 topic
Figure 15. Delay for office/roomA15 topic
Figure 16. Throughput for
office/roomA15 topic
6. Conclusion
We have built an internet gateway device which receives data from the middleware
using publish-subscribe approach and uses GPRS network to make internet connection so that
data from the intranet (which is the location of the middleware) can be sent to the data storage
(which is located on the internet). From the experiments, we get the internet gateway device is
also able to send up to 10MB of data, though needs 11398 seconds (3 hours 9 minutes and
58 seconds) delay. The reliability tests are done by sending 10, 20, 30, 40, and 50 data for each
topic. From the sending of office/roomA13 topic data, we get 4.79 seconds of average delay and
60.72 bps of average throughput. From the sending of office/roomA14 topic data, we get
4.28 seconds of average delay and 69 bps of average throughput. And from the sending of
office/roomA15 topic data, we get 916 seconds of average delay and 908.3 bps of average
throughput. We have 80% packet loss for sending office/roomA15 topic because it sends bigger
data than office/roomA13 and office/roomA14 topics. In future work for answer higher packet
lost in delivering images data, a GPRS module should replace with a 3G/4G module. Otherwise,
must be provided separate IGD for images data using 3G/4G and for other small sensor data
using GPRS or try with narrowband IoT.
References
[1] Navulur S, Sastry AS, Prasad MG, Prasad G. Agricultural management through wireless sensors and
internet of things. International Journal of Electrical and Computer Engineering (IJECE). 2017; 7(6):
3492-9.
[2] Rghioui A, Oumnad A. Internet of Things: Surveys for Measuring Human Activities from Everywhere.
International Journal of Electrical and Computer Engineering (IJECE). 2017; 7(5): 2474-82.
[3] Tan L. Future internet: The Internet of Things. 2010 3rd Int. Conf. Adv. Comput. Theory Eng. 2010; 5:
V5-376–V5-380.
8. ISSN: 1693-6930
TELKOMNIKA Vol. 17, No. 3, June 2019: 1439-1446
1446
[4] Ma M, Wang P, Chu CH. Data Management for Internet of Things: Challenges, Approaches and
Opportunities. IEEE Int. Conf. IEEE Cyber, Phys. Soc. Comput. 2013: 1144–1151.
[5] Pramukantoro ES, Anwari H. An Event-Based Middleware For Syntactical Interoperability In Internet
Of Things. International Journal of Electrical and Computer Engineering. 2018; 8(5): 3784-3792.
[6] Pramukantoro ES, Yahya W, Bakhtiar FA. Perform evaluation of IoT middleware for syntactical
Interoperability. International Conference on Advanced Computer Science and Information Systems
(ICACSIS). 2017: 29-34.
[7] Pramukantoro ES, Yahya W, Arganata G, Bhawiyuga A, Basuki A. Topic based IoT data storage
framework for heterogeneous sensor data. 11th International Conference on Telecommunication
Systems Services and Applications (TSSA). 2017: 1-4.
[8] Alessio Botta, Walterde Donato, Valerio Persico, and Antonio Pescapé. Integration of Cloud
computing and Internet of Things: A survey. Future Generation Computer Systems. 2016; 56:
684-700
[9] K Kamgueu PO, Nataf E, Djotio T. Architecture for an efficient integration of wireless sensor networks
to the Internet through Internet of Things gateways. International Journal of Distributed Sensor
Networks. 2017; 13(11).
[10] Zhong CL, Zhu Z, Huang RG. Study on the IOT Architecture and Gateway Technology. 2015 14th
International Symposium on Distributed Computing and Applications for Business Engineering and
Science (DCABES). 2015: 196–199.
[11] Venkatesan VP, Devi CP, Sivaranjani M. Design of a smart gateway solution based on the
exploration of specific challenges in IoT. Proc. Int. Conf. IoT Soc. Mobile, Anal. Cloud, I-SMAC 2017.
2017: 22–31.
[12] Lee YH, Nair S. A Smart Gateway Framework for IOT Services. Proc. - 2016 IEEE Int. Conf. Internet
Things; IEEE Green Comput. Commun. IEEE Cyber, Phys. Soc. Comput. IEEE Smart Data,
iThings-GreenCom-CPSCom-Smart Data 2016. 2017: 107–114.
[13] Kang B, Kim D, Choo H. Internet of everything: A large-scale autonomic iot gateway. IEEE
Transactions on Multi-Scale Computing Systems. 2017; 3(3): 206-214.
[14] Zhu Q, Wang R, Chen Q, Liu Y, Qin W. IOT gateway: Bridging wireless sensor networks into Internet
of Things. Proc. - IEEE/IFIP Int. Conf. Embed. Ubiquitous Comput. EUC 2010. 2010: 347–352.
[15] He HJ, Yue ZQ, Wang XJ. Design and realization of wireless sensor network gateway based on
zigbee and GPRS. 2009 2nd Int. Conf. Inf. Comput. Sci. ICIC 2009. 2009; 2: 196–199.
[16] Guoqiang S, Yanming C, Chao Z, Yanxu Z. Design and implementation of a smart IoT gateway.
Proc. - 2013 IEEE Int. Conf. Green Comput. Commun. IEEE Internet Things IEEE Cyber, Phys. Soc.
Comput. GreenCom-iThings-CPSCom 2013. 2013: 720–723.
[17] Novo O, Beijar N, Ocak M, Kjallman J, Komu M, Kauppinen T. Capillary networks - Bridging the
cellular and IoT worlds. IEEE World Forum Internet Things, WF-IoT 2015 - Proc. 2015: 571–578.
[18] Singh S, Huang KL. A robust M2M Gateway for effective integration of capillary and 3GPP networks.
Int. Symp. Adv. Networks Telecommun. Syst. ANTS. 2011.
[19] Bing K, Fu L, Zhuo Y, Yanlei L. Design of an Internet of things-based smart home system. Proc. 2nd
Int. Conf. Intell. Control Inf. Process. ICICIP 2011. 2011; 2: 921–924.
[20] Aloi G, Caliciuri G, Fortino G, Gravina R, Pace P, Russo W, Savaglio C. Enabling IoT interoperability
through opportunistic smartphone-based mobile gateways. Journal of Network and Computer
Applications. 2017; 81: 74-84.
[21] Yue W, et al. Gatewaying the Wireless Sensor Networks. 2013 IEEE 9th Int. Conf. Mob. Ad-hoc
Sens. Networks. 2013: 61–66.
[22] Grygoruk A, Legierski J. IoT gateway-implementation proposal based on Arduino board. Proc. 2016
Fed. Conf. Comput. Sci. Inf. Syst. FedCSIS 2016. 2016: 1011–1014.
[23] Kim SM, Choi HS, Rhee WS. IoT home gateway for auto-configuration and management of MQTT
devices. 2015 IEEE Conf. Wirel. Sensors, ICWiSE 2015. 2016: 12–17.
[24] Morabito R, Petrolo R, Loscri V, Mitton N. LEGIoT: a Lightweight Edge Gateway for the Internet of
Things. Future Generation Computer Systems. 2018; 81: 1-15.
[25] Pavithra D, Balakrishnan R. IoT based Monitoring and Control System for Home Automation. Proc.
2015 Glob. Conf. Commun. Technol. 2015; 35(1): 24.