Research Inventy : International Journal of Engineering and Science is published by the group of young academic and industrial researchers with 12 Issues per year. It is an online as well as print version open access journal that provides rapid publication (monthly) of articles in all areas of the subject such as: civil, mechanical, chemical, electronic and computer engineering as well as production and information technology. The Journal welcomes the submission of manuscripts that meet the general criteria of significance and scientific excellence. Papers will be published by rapid process within 20 days after acceptance and peer review process takes only 7 days. All articles published in Research Inventy will be peer-reviewed.
This report is prepared for the major project submission for EC Engineering, This project deals with the development of Home Monitoring System using Internet of Things.
This is first detailed report submitted ever with whole content over Internet of Things based Home Automation system. Help of many journals have been taken and those references have been acknowledged at the end of the report file.
IoT: Ongoing challenges and opportunities in Mobile TechnologyAI Publications
Mobile technology opens the door for a new kind of learning called here and now learning that occurs when learners have access to information anytime and anywhere to perform authentic activities in the context of their learning. Mobile devices, applications and services have become integrated into people's daily lives on a personal and professional level. The purpose of this study was to investigate challenges &opportunities of IoT in mobile technology. The paper is divided in 5 sections and the content of the paper covers the history, elements, challenges and opportunities salong with future of IoT specific to Indian Mobile arena.
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGSIJNSA Journal
The idea to connect everything to anything and at any point of time is what vaguely defines the concept of
the Internet of Things (IoT). The IoT is not only about providing connectivity but also facilitating
interaction among these connected things. Though the term IoT was introduced in 1999 but has drawn
significant attention during the past few years, the pace at which new devices are being integrated into the
system will profoundly impact the world in a good way but also poses some severe queries about security
and privacy. IoT in its current form is susceptible to a multitudinous set of attacks. One of the most
significant concerns of IoT is to provide security assurance for the data exchange because data is
vulnerable to some attacks by the attackers at each layer of IoT. The IoT has a layered structure where
each layer provides a service. The security needs vary from layer to layer as each layer serves a different
purpose. This paper aims to analyze the various security and privacy threats related to IoT. Some attacks
have been discussed along with some existing and proposed countermeasures.
THE INTERNET OF THINGS: NEW INTEROPERABILITY, MANAGEMENT AND SECURITY CHALLENGESIJNSA Journal
The Internet of Things (IoT) brings connectivity to about every objects found in the physical space. It extends connectivity to everyday objects. From connected fridges, cars and cities, the IoT creates opportunities in numerous domains. However, this increase in connectivity creates many prominent challenges. This paper provides a survey of some of the major issues challenging the widespread adoption of the IoT. Particularly, it focuses on the interoperability, management, security and privacy issues in the IoT. It is concluded that there is a need to develop a multifaceted technology approach to IoT security,
management, and privacy.
Internet of Things (IoT) integrates billions of the heterogeneous IoT things with the Internet in which the embedded systems such as sensors and actuators linked together to improve quality of life, and becomes the future of technologies in any field of human daily life. These IoT devices cooperate with each other and generate useful information to provide better services and applications to the governments and the society. Also, there is a need to store these data on Cloud for monitoring. This paper, surveys IoT applications, new challenges and issues arise in different fields and provides IoT architecture, focuses on explanation of IoT protocols and their operations and functionalities, presents different microcontroller types used by researchers. With the huge amount of data generated from IoT devices, the integrating Cloud and IoT may helpful, Therefore, a survey on open issues faced when these two concepts integrating together is discussed. The objective of this paper is to provide a survey for everything related to IoT and direct it to all beginners in this filed or academic researchers.
This report is prepared for the major project submission for EC Engineering, This project deals with the development of Home Monitoring System using Internet of Things.
This is first detailed report submitted ever with whole content over Internet of Things based Home Automation system. Help of many journals have been taken and those references have been acknowledged at the end of the report file.
IoT: Ongoing challenges and opportunities in Mobile TechnologyAI Publications
Mobile technology opens the door for a new kind of learning called here and now learning that occurs when learners have access to information anytime and anywhere to perform authentic activities in the context of their learning. Mobile devices, applications and services have become integrated into people's daily lives on a personal and professional level. The purpose of this study was to investigate challenges &opportunities of IoT in mobile technology. The paper is divided in 5 sections and the content of the paper covers the history, elements, challenges and opportunities salong with future of IoT specific to Indian Mobile arena.
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGSIJNSA Journal
The idea to connect everything to anything and at any point of time is what vaguely defines the concept of
the Internet of Things (IoT). The IoT is not only about providing connectivity but also facilitating
interaction among these connected things. Though the term IoT was introduced in 1999 but has drawn
significant attention during the past few years, the pace at which new devices are being integrated into the
system will profoundly impact the world in a good way but also poses some severe queries about security
and privacy. IoT in its current form is susceptible to a multitudinous set of attacks. One of the most
significant concerns of IoT is to provide security assurance for the data exchange because data is
vulnerable to some attacks by the attackers at each layer of IoT. The IoT has a layered structure where
each layer provides a service. The security needs vary from layer to layer as each layer serves a different
purpose. This paper aims to analyze the various security and privacy threats related to IoT. Some attacks
have been discussed along with some existing and proposed countermeasures.
THE INTERNET OF THINGS: NEW INTEROPERABILITY, MANAGEMENT AND SECURITY CHALLENGESIJNSA Journal
The Internet of Things (IoT) brings connectivity to about every objects found in the physical space. It extends connectivity to everyday objects. From connected fridges, cars and cities, the IoT creates opportunities in numerous domains. However, this increase in connectivity creates many prominent challenges. This paper provides a survey of some of the major issues challenging the widespread adoption of the IoT. Particularly, it focuses on the interoperability, management, security and privacy issues in the IoT. It is concluded that there is a need to develop a multifaceted technology approach to IoT security,
management, and privacy.
Internet of Things (IoT) integrates billions of the heterogeneous IoT things with the Internet in which the embedded systems such as sensors and actuators linked together to improve quality of life, and becomes the future of technologies in any field of human daily life. These IoT devices cooperate with each other and generate useful information to provide better services and applications to the governments and the society. Also, there is a need to store these data on Cloud for monitoring. This paper, surveys IoT applications, new challenges and issues arise in different fields and provides IoT architecture, focuses on explanation of IoT protocols and their operations and functionalities, presents different microcontroller types used by researchers. With the huge amount of data generated from IoT devices, the integrating Cloud and IoT may helpful, Therefore, a survey on open issues faced when these two concepts integrating together is discussed. The objective of this paper is to provide a survey for everything related to IoT and direct it to all beginners in this filed or academic researchers.
WIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVEScsandit
The common vision of smart systems today, is by and large associated with one single concept,
the internet of things (IoT), where the whole physical infrastructure is linked with intelligent
monitoring and communication technologies through the use of wireless sensors. In such an
intelligent vibrant system, sensors are connected to send useful information and control
instructions via distributed sensor networks. Wireless sensors have an easy deployment and
better flexibility of devices contrary to wired setup. With the rapid technological development of
sensors, wireless sensor networks (WSNs) will become the key technology for IoT and an
invaluable resource for realizing the vision of Internet of things (IoT) paradigm. It is also
important to consider whether the sensors of a WSN should be completely integrated into IoT or
not. New security challenges arise when heterogeneous sensors are integrated into the IoT. Security needs to be considered at a global perspective, not just at a local scale. This paper gives an overview of sensor integration into IoT, some major security challenges and also a
number of security primitives that can be taken to protect their data over the internet.
WIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVESIJCNCJournal
The common vision of smart systems today, is by and large associated with one single concept, the internet of things (IoT), where the whole physical infrastructure is linked with intelligent monitoring and communication technologies through the use of wireless sensors. In such an intelligent vibrant system, sensors are connected to send useful information and control instructions via distributed sensor networks. Wireless sensors have an easy deployment and better flexibility of devices contrary to wired setup. With the rapid technological development of sensors, wireless sensor networks (WSNs) will become the key technology for IoT and an invaluable resource for realizing the vision of Internet of things (IoT) paradigm.
It is also important to consider whether the sensors of a WSN should be completely integrated into IoT or not. New security challenges arise when heterogeneous sensors are integrated into the IoT. Security needs to be considered at a global perspective, not just at a local scale. This paper gives an overview of sensor integration into IoT, some major security challenges and also a number of security primitives that can be taken to protect their data over the internet.
Architectural Layers of Internet of Things: Analysis of Security Threats and ...Scientific Review SR
A pervasive network architecture that interconnect heterogeneous objects, devices, technologies and services called
Internet of Things has prompted a drastic change in demand of smart devices which in turn has increased the rate of
data exchange. These smart devices are built with numerous sensors which collect information from other interacting
devices, process it and send it to remote locations for storage or further processing. Although this mechanism of data
processing and sharing has contributed immensely to the information world, it has recently posed high security risk
on privacy and data confidentiality. This paper therefore analyses different security threats to data at different
architectural layers of Internet of Things, possible countermeasures and other in-depth security measures for Internet
of Things. The paper identifies device authentication on IoT network to be of paramount impo rtance in securing IoT
systems. This paper also suggests some essential technologies of security such as encryption for securing IoT
devices and the data shared over IoT network
The Internet of Things (IoT): An OverviewIJERA Editor
Information and Communications Technology (ICT) controls our daily behaviors. It becomes a main part of our
life critical infrastructure bringing interconnection of heterogeneous devices in different aspects. Personal
computing, sensing, surveillance, smart homes, entertainment, transportation and video streaming are examples,
to name a few. As a critical living entity, Internet is contentiously changing and evolving leading to emerging
new technologies, applications, protocols and algorithms. Acceleration of wireless communication trends brings
an ever growing innovation in Internet connectivity and mobile broadband. Infrastructureless communication
devices become ubiquitous, smart, powerful, connectible, smaller, cheaper, and easier to deploy and install. This
opens a new future direction in the society of ICT: the Internet of Things (IoT). Nowadays, the IoT, early
defined as Machine-to-Machine (M2M) communications, becomes a key concern of ICT world and research
communities. In this paper, we provide an overview study of the IoT paradigm, its concepts, principles and
potential benefits. Specifically, we focus on the IoT major technologies, emerging protocols, and widespread
applications. This overview can help those who start approaching the IoT world aiming to understand and
participate to its development.
Internet of Things (IoT) plays a vital role in our
day to day life and normally used in our houses, in industry,
schools and in hospitals which implemented outside to manage
and control for taking report the changes in location prevent
from dangers and many more favorable things. Moreover all
other advantages can approach of big risks of privacy loss and
security issues. To protect the IoT devices, so many research
works have been measure to find those problems and locate a
best way to eradicate those risks or at least to reduce their effect
on the security and privacy requirement. Formation the concept
of device to device (D2D) communication technology, IoT plays
the information transfer from one end to another end as node of
interconnection. This paper examines the constraints and
security challenges posed by IoT connected devices and the
ability to connect, communicate with, and remotely manage an
incalculable number of networked, automated devices via the
Internet is becoming pervasive.
RT-RCT: an online tool for real-time retrieval of connected thingsjournalBEEI
In recent years, internet of things (IoT) represents a giant and a promoter area in innovation and engineering fields. IoT devices are spread in various fields and offer advanced services which assist their users to monitor and control objects remotely. IoT has a set of special characteristics such as dynamic, variety of data and huge scale which introduces a great challenge in the field of retrieval technologies, more precisely real-time retrieval. This paper addresses the issue of real-time retrieval of connected things and tries to propose an innovative solution which allows the retrieval of these things and their descriptive data. The paper proposes an on-line tool for real-time retrieval of connected things and their descriptive data based on network port scanning technique. The performance of this tool proves to be powerful under normal conditions, however more tests must be implemented in the aim to improve the proposed solution. The tool resulted from this work appears to be promising and can be used as a reference by network administrators and IT security managers for the development of new security mechanisms and security reinforcement.
Study on Issues in Managing and Protecting Data of IOTijsrd.com
This paper discusses variety of issues for preserving and managing data produced by IoT. Every second large amount of data are added or updated in the IoT databases across the heterogeneous environment. While managing the data each phase of data processing for IoT data is exigent like storing data, querying, indexing, transaction management and failure handling. We also refer to the problem of data integration and protection as data requires to be fit in single layout and travel securely as they arrive in the pool from diversified sources in different structure. Finally, we confer a standardized pathway to manage and to defend data in consistent manner.
Hardware/Software Interoperability and Single Point Vulnerability Problems of...BRNSS Publication Hub
As reiterated by many authors, internet of things (IoT) is the network of physical devices, vehicles, home appliances, and other items embedded with electronics, software, sensors, actuators, and connectivity which enables these things to connect and exchange data, creating opportunities for more direct integration of the physical world into computer-based systems, resulting in efficiency improvements, economic benefits, and reduced human exertions. This is made possible by the communications models with the enabling technologies which make communications possible among IoT connected devices, although, with drawbacks. These drawbacks are the major reasons for adoption problems of IoT services by the society. This paper carried out an investigative study on previous works on the societal applications and adoption problems of IoT, IoT communications models, and pros and cons of IoT. Through the study, it was revealed that for IoT devices and services to be widely adopted with no or minimal problems, future IoT technology will not only address the known drawbacks but also will require hardware and software components that are highly interoperable, dependable, reconfigurable, and, in many applications, certifiable.
Internet of Things IoT Anytime Anywhere Anything ConnectivityYogeshIJTSRD
This paper presents the key challenges in the domain of IoT. The key challenges associated with the development of IoT, industry as well as government, Industrial IoT systems, the related security and privacy challenges has been reviewed and presented. Vulnerability of Internet of Things systems have been improved with the advent of new computational systems for IoT. However, the current design of IoT does not effectively address the higher security requirements posed by those vulnerabilities. Many recent attacks on IoT systems have shown that novel security solutions are needed to protect this emerging system. Nidhi Chadha | Ramandeep Kaur "Internet of Things (IoT): Anytime-Anywhere-Anything Connectivity" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-3 , April 2021, URL: https://www.ijtsrd.com/papers/ijtsrd40008.pdf Paper URL: https://www.ijtsrd.com/computer-science/computer-network/40008/internet-of-things-iot-anytimeanywhereanything-connectivity/nidhi-chadha
A survey on Internet of Things (IoT) security : Challenges and Current statusvivatechijri
When Internet of Things (IoT) applications become a part of people’s daily life, security issues in IoT have caught substantial attention in both academia and industry. Compared to traditional computing systems, IoT systems have more inherent vulnerabilities, and in the intervening time, could have higher security requirements. However, the current design of IoT does not successfully address the higher security requirements postured by those vulnerabilities. Many recent attacks on IoT systems have shown that novel security solutions are needed to defend this emerging system. This paper purposes to examine security challenges resulted from the special characteristics of the IoT systems and the new features of the IoT applications. This could help pave the road to better security solution design. Furthermore, three architectural security designs are suggested and analyzed. Examples of how to implement these designs are discussed. Finally, for each layer in IoT architecture, open issues are also identified.
This tutorial gives overview of the data science pipeline for analyzing IoT network data. It contains references to scientific articles to learn more about algorithms, visualizations and IoT systems. The tutorial was presented at ACM Richard Tapia 2018.
WIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVEScsandit
The common vision of smart systems today, is by and large associated with one single concept,
the internet of things (IoT), where the whole physical infrastructure is linked with intelligent
monitoring and communication technologies through the use of wireless sensors. In such an
intelligent vibrant system, sensors are connected to send useful information and control
instructions via distributed sensor networks. Wireless sensors have an easy deployment and
better flexibility of devices contrary to wired setup. With the rapid technological development of
sensors, wireless sensor networks (WSNs) will become the key technology for IoT and an
invaluable resource for realizing the vision of Internet of things (IoT) paradigm. It is also
important to consider whether the sensors of a WSN should be completely integrated into IoT or
not. New security challenges arise when heterogeneous sensors are integrated into the IoT. Security needs to be considered at a global perspective, not just at a local scale. This paper gives an overview of sensor integration into IoT, some major security challenges and also a
number of security primitives that can be taken to protect their data over the internet.
WIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVESIJCNCJournal
The common vision of smart systems today, is by and large associated with one single concept, the internet of things (IoT), where the whole physical infrastructure is linked with intelligent monitoring and communication technologies through the use of wireless sensors. In such an intelligent vibrant system, sensors are connected to send useful information and control instructions via distributed sensor networks. Wireless sensors have an easy deployment and better flexibility of devices contrary to wired setup. With the rapid technological development of sensors, wireless sensor networks (WSNs) will become the key technology for IoT and an invaluable resource for realizing the vision of Internet of things (IoT) paradigm.
It is also important to consider whether the sensors of a WSN should be completely integrated into IoT or not. New security challenges arise when heterogeneous sensors are integrated into the IoT. Security needs to be considered at a global perspective, not just at a local scale. This paper gives an overview of sensor integration into IoT, some major security challenges and also a number of security primitives that can be taken to protect their data over the internet.
Architectural Layers of Internet of Things: Analysis of Security Threats and ...Scientific Review SR
A pervasive network architecture that interconnect heterogeneous objects, devices, technologies and services called
Internet of Things has prompted a drastic change in demand of smart devices which in turn has increased the rate of
data exchange. These smart devices are built with numerous sensors which collect information from other interacting
devices, process it and send it to remote locations for storage or further processing. Although this mechanism of data
processing and sharing has contributed immensely to the information world, it has recently posed high security risk
on privacy and data confidentiality. This paper therefore analyses different security threats to data at different
architectural layers of Internet of Things, possible countermeasures and other in-depth security measures for Internet
of Things. The paper identifies device authentication on IoT network to be of paramount impo rtance in securing IoT
systems. This paper also suggests some essential technologies of security such as encryption for securing IoT
devices and the data shared over IoT network
The Internet of Things (IoT): An OverviewIJERA Editor
Information and Communications Technology (ICT) controls our daily behaviors. It becomes a main part of our
life critical infrastructure bringing interconnection of heterogeneous devices in different aspects. Personal
computing, sensing, surveillance, smart homes, entertainment, transportation and video streaming are examples,
to name a few. As a critical living entity, Internet is contentiously changing and evolving leading to emerging
new technologies, applications, protocols and algorithms. Acceleration of wireless communication trends brings
an ever growing innovation in Internet connectivity and mobile broadband. Infrastructureless communication
devices become ubiquitous, smart, powerful, connectible, smaller, cheaper, and easier to deploy and install. This
opens a new future direction in the society of ICT: the Internet of Things (IoT). Nowadays, the IoT, early
defined as Machine-to-Machine (M2M) communications, becomes a key concern of ICT world and research
communities. In this paper, we provide an overview study of the IoT paradigm, its concepts, principles and
potential benefits. Specifically, we focus on the IoT major technologies, emerging protocols, and widespread
applications. This overview can help those who start approaching the IoT world aiming to understand and
participate to its development.
Internet of Things (IoT) plays a vital role in our
day to day life and normally used in our houses, in industry,
schools and in hospitals which implemented outside to manage
and control for taking report the changes in location prevent
from dangers and many more favorable things. Moreover all
other advantages can approach of big risks of privacy loss and
security issues. To protect the IoT devices, so many research
works have been measure to find those problems and locate a
best way to eradicate those risks or at least to reduce their effect
on the security and privacy requirement. Formation the concept
of device to device (D2D) communication technology, IoT plays
the information transfer from one end to another end as node of
interconnection. This paper examines the constraints and
security challenges posed by IoT connected devices and the
ability to connect, communicate with, and remotely manage an
incalculable number of networked, automated devices via the
Internet is becoming pervasive.
RT-RCT: an online tool for real-time retrieval of connected thingsjournalBEEI
In recent years, internet of things (IoT) represents a giant and a promoter area in innovation and engineering fields. IoT devices are spread in various fields and offer advanced services which assist their users to monitor and control objects remotely. IoT has a set of special characteristics such as dynamic, variety of data and huge scale which introduces a great challenge in the field of retrieval technologies, more precisely real-time retrieval. This paper addresses the issue of real-time retrieval of connected things and tries to propose an innovative solution which allows the retrieval of these things and their descriptive data. The paper proposes an on-line tool for real-time retrieval of connected things and their descriptive data based on network port scanning technique. The performance of this tool proves to be powerful under normal conditions, however more tests must be implemented in the aim to improve the proposed solution. The tool resulted from this work appears to be promising and can be used as a reference by network administrators and IT security managers for the development of new security mechanisms and security reinforcement.
Study on Issues in Managing and Protecting Data of IOTijsrd.com
This paper discusses variety of issues for preserving and managing data produced by IoT. Every second large amount of data are added or updated in the IoT databases across the heterogeneous environment. While managing the data each phase of data processing for IoT data is exigent like storing data, querying, indexing, transaction management and failure handling. We also refer to the problem of data integration and protection as data requires to be fit in single layout and travel securely as they arrive in the pool from diversified sources in different structure. Finally, we confer a standardized pathway to manage and to defend data in consistent manner.
Hardware/Software Interoperability and Single Point Vulnerability Problems of...BRNSS Publication Hub
As reiterated by many authors, internet of things (IoT) is the network of physical devices, vehicles, home appliances, and other items embedded with electronics, software, sensors, actuators, and connectivity which enables these things to connect and exchange data, creating opportunities for more direct integration of the physical world into computer-based systems, resulting in efficiency improvements, economic benefits, and reduced human exertions. This is made possible by the communications models with the enabling technologies which make communications possible among IoT connected devices, although, with drawbacks. These drawbacks are the major reasons for adoption problems of IoT services by the society. This paper carried out an investigative study on previous works on the societal applications and adoption problems of IoT, IoT communications models, and pros and cons of IoT. Through the study, it was revealed that for IoT devices and services to be widely adopted with no or minimal problems, future IoT technology will not only address the known drawbacks but also will require hardware and software components that are highly interoperable, dependable, reconfigurable, and, in many applications, certifiable.
Internet of Things IoT Anytime Anywhere Anything ConnectivityYogeshIJTSRD
This paper presents the key challenges in the domain of IoT. The key challenges associated with the development of IoT, industry as well as government, Industrial IoT systems, the related security and privacy challenges has been reviewed and presented. Vulnerability of Internet of Things systems have been improved with the advent of new computational systems for IoT. However, the current design of IoT does not effectively address the higher security requirements posed by those vulnerabilities. Many recent attacks on IoT systems have shown that novel security solutions are needed to protect this emerging system. Nidhi Chadha | Ramandeep Kaur "Internet of Things (IoT): Anytime-Anywhere-Anything Connectivity" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-3 , April 2021, URL: https://www.ijtsrd.com/papers/ijtsrd40008.pdf Paper URL: https://www.ijtsrd.com/computer-science/computer-network/40008/internet-of-things-iot-anytimeanywhereanything-connectivity/nidhi-chadha
A survey on Internet of Things (IoT) security : Challenges and Current statusvivatechijri
When Internet of Things (IoT) applications become a part of people’s daily life, security issues in IoT have caught substantial attention in both academia and industry. Compared to traditional computing systems, IoT systems have more inherent vulnerabilities, and in the intervening time, could have higher security requirements. However, the current design of IoT does not successfully address the higher security requirements postured by those vulnerabilities. Many recent attacks on IoT systems have shown that novel security solutions are needed to defend this emerging system. This paper purposes to examine security challenges resulted from the special characteristics of the IoT systems and the new features of the IoT applications. This could help pave the road to better security solution design. Furthermore, three architectural security designs are suggested and analyzed. Examples of how to implement these designs are discussed. Finally, for each layer in IoT architecture, open issues are also identified.
This tutorial gives overview of the data science pipeline for analyzing IoT network data. It contains references to scientific articles to learn more about algorithms, visualizations and IoT systems. The tutorial was presented at ACM Richard Tapia 2018.
Encuesta elaborada por PwC y CSFI sobre las amenazas y oportunidades de negocio para las aseguradoras en el año 2013.
Más información:
http://www.youtube.com/watch?v=Dh_3z6Tt92U
Study on Fog Computing and Data Concurrency in IoT. Includes an analysis of different data concurrency techniques, their principle and some recent developments in the area. Also covers the topic of Fog Computing and its development and application in IoT.
THE INTERNET OF THINGS: NEW INTEROPERABILITY, MANAGEMENT AND SECURITY CHALLENGESIJNSA Journal
The Internet of Things (IoT) brings connectivity to about every objects found in the physical space. It extends connectivity to everyday objects. From connected fridges, cars and cities, the IoT creates opportunities in numerous domains. However, this increase in connectivity creates many prominent challenges. This paper provides a survey of some of the major issues challenging the widespread adoption of the IoT. Particularly, it focuses on the interoperability, management, security and privacy issues in the IoT. It is concluded that there is a need to develop a multifaceted technology approach to IoT security, management, and privacy.
THE INTERNET OF THINGS: NEW INTEROPERABILITY, MANAGEMENT AND SECURITY CHALLENGESIJNSA Journal
The Internet of Things (IoT) brings connectivity to about every objects found in the physical space. It
extends connectivity to everyday objects. From connected fridges, cars and cities, the IoT creates
opportunities in numerous domains. However, this increase in connectivity creates many prominent
challenges. This paper provides a survey of some of the major issues challenging the widespread adoption
of the IoT. Particularly, it focuses on the interoperability, management, security and privacy issues in the
IoT. It is concluded that there is a need to develop a multifaceted technology approach to IoT security,
management, and privacy.
The Internet of Things (IoT), also referred to as the Internet of Objects, will change everything—including ourselves. This may seem like a bold statement, but consider the impact the Internet already had on education, science, communication, business, government, and humanity. Clearly, the Internet is one of the most important and a powerful creation in all of human history. This paper discussesIOT architecture, IOT applications and limitations of IOT.
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGSIJNSA Journal
The idea to connect everything to anything and at any point of time is what vaguely defines the concept of the Internet of Things (IoT). The IoT is not only about providing connectivity but also facilitating interaction among these connected things. Though the term IoT was introduced in 1999 but has drawn significant attention during the past few years, the pace at which new devices are being integrated into the system will profoundly impact the world in a good way but also poses some severe queries about security and privacy. IoT in its current form is susceptible to a multitudinous set of attacks. One of the most significant concerns of IoT is to provide security assurance for the data exchange because data is vulnerable to some attacks by the attackers at each layer of IoT. The IoT has a layered structure where each layer provides a service. The security needs vary from layer to layer as each layer serves a different purpose. This paper aims to analyze the various security and privacy threats related to IoT. Some attacks have been discussed along with some existing and proposed countermeasures.
Understanding the Information Architecture, Data Management, and Analysis Cha...Cognizant
As the Internet of Things (IoT) becomes increasingly prevalent, organizations must build the enterprise information architecture required to gather, manage, and analyze vast troves of rich real-time data. We offer an IoT framework, use cases, and a maturity model that helps enable you to choose an adoption approach.
CONTEXT INFORMATION AGGREGATION MECHANISM BASED ON BLOOM FILTERS (CIA-BF) FOR...IJCNCJournal
Internet of Things (IoT) has become a popular technology in recent years. Different IoT applications such
as traffic control, environment monitoring, etc. contain many sensor devices, routers, actuators, edge
routers, and Base Stations (BS) which communicate with each other and send millions of data packets that
need to be delivered to their destination nodes successfully to ensure the High-performance communication
networks. IoT devices connect to the Internet using wired or wireless communication channels where most
of the devices are wearable, which means people slowly move from one point to another or fast-moving
using vehicles. How to ensure high performance of IoT data networks is an important research challenge
while considering the limitation of some IoT devices that may have limited power resources or limited
coverage areas. Many Kinds of research focus on how to customize routing protocols to be efficient for
IoT devices. The traditional routing mechanisms utilized specific IP addresses to identify users while in IoT
it is more beneficial to identify a group of users (things) based on any contexts, status, or values of their
resources such as the level of their batteries (e.g., low, medium or high). While IoT devices have different
characteristics, a multicasting mechanism to send one message to various groups of devices will not be
efficient in IoT communication networks since the aggregation of packets is very difficult. Thus, it is useful
to propose a mechanism that able to filter data packets that need to be sent to a specific group of devices.
In this paper, we propose efficient context-aware addressing mechanism, which is based on bloom filters
to increase the performance of IoT communication networks. A routing architecture is built based on
bloom filters which store routing information. In our works, we reduce the size of routing information
using a proposed aggregation mechanism which is based on connecting each group of IoT devices with an
edge router which is hierarchically connected to an upper router after operating its bloom filter. Our
simulation results show a significant improvement in the IoT performance metrics such as packets
transmission delay, jitter the throughput, packets dropping ratio, and the energy consumption in
comparison with well-known routing protocols of IoT such as Destination Sequenced Distance Vector
routing protocol (DSDV), and Ad hoc On-demand Distance Vector routing protocol (AODV).
Context Information Aggregation Mechanism Based on Bloom Filters (CIA-BF) for...IJCNCJournal
Internet of Things (IoT) has become a popular technology in recent years. Different IoT applications such as traffic control, environment monitoring, etc. contain many sensor devices, routers, actuators, edge routers, and Base Stations (BS) which communicate with each other and send millions of data packets that need to be delivered to their destination nodes successfully to ensure the High-performance communication networks. IoT devices connect to the Internet using wired or wireless communication channels where most of the devices are wearable, which means people slowly move from one point to another or fast-moving using vehicles. How to ensure high performance of IoT data networks is an important research challenge while considering the limitation of some IoT devices that may have limited power resources or limited coverage areas. Many Kinds of research focus on how to customize routing protocols to be efficient for IoT devices. The traditional routing mechanisms utilized specific IP addresses to identify users while in IoT it is more beneficial to identify a group of users (things) based on any contexts, status, or values of their resources such as the level of their batteries (e.g., low, medium or high). While IoT devices have different characteristics, a multicasting mechanism to send one message to various groups of devices will not be efficient in IoT communication networks since the aggregation of packets is very difficult. Thus, it is useful to propose a mechanism that able to filter data packets that need to be sent to a specific group of devices. In this paper, we propose efficient context-aware addressing mechanism, which is based on bloom filters to increase the performance of IoT communication networks. A routing architecture is built based on bloom filters which store routing information. In our works, we reduce the size of routing information using a proposed aggregation mechanism which is based on connecting each group of IoT devices with an edge router which is hierarchically connected to an upper router after operating its bloom filter. Our simulation results show a significant improvement in the IoT performance metrics such as packets transmission delay, jitter the throughput, packets dropping ratio, and the energy consumption in comparison with well-known routing protocols of IoT such as Destination Sequenced Distance Vector routing protocol (DSDV), and Ad hoc On-demand Distance Vector routing protocol (AODV).
Experimental Investigation of a Household Refrigerator Using Evaporative-Cool...inventy
The objective of this paper was to investigate experimentally the effect of Evaporative-cooled condenser in a household refrigerator. The experiment was done using HCF134a as the refrigerant. The performance of the household refrigerator with air-cooled and Evaporative-cooled condenser was compared for different load conditions. The results indicate that the refrigerator performance had improved when evaporative-cooled condenser was used instead of air-cooled condenser on all load conditions. Evaporativecooled condenser reduced the energy consumption when compared with the air-cooled condenser. There was also an enhancement in coefficient of performance (COP) when evaporative-cooled condenser was used instead of air-cooled condenser. The Evaporative cooled heat exchanger was designed and the system was modified by retrofitting it, instead of the conventional air-cooled condenser by making drop wise condensation using water and forced circulation over the condenser. From the experimental analysis it is observed that the COP of evaporative cooled system increased by 13.44% compared to that of air cooled system. So the overall efficiency and refrigerating effect is increased. In minimum constructional, maintenance and running cost, the system is much useful for domestic purpose. This study also revealed that combining a evaporative cooled system along with conventional water cooled system under the condition that the defrost water obtained from the freezer is used for drop wise condensation over condenser and water cooled condensation of the condenser at the bottom using remaining defrost water would reduce the power consumption, work done and hence further increase in refrigerating effect of the system. The study has shown that such a system is technically feasible and economically viable
Copper Strip Corrossion Test in Various Aviation Fuelsinventy
This research work takes in to account of corrosiveness test on various aviation fuels in the state of Telengana (India). The purpose of this experiment is to determine the corrosiveness test of fuels. This determination will be accomplished by using copper strip corrosion test by using the copper strip experiment we can determine the corrosive property of the fuel and hence the efficiency of fuel. The research covers the importance of knowing the corrosive property of different petroleum fuels including aviation turbine fuel.
Additional Conservation Laws for Two-Velocity Hydrodynamics Equations with th...inventy
A series of the differential identities connecting velocities, pressure and body force in the twovelocity hydrodynamics equations with equilibrium of pressure phases in reversible hydrodynamic approximation is obtaned.
Comparative Study of the Quality of Life, Quality of Work Life and Organisati...inventy
People’s lives are increasingly centred on work; they spend at least one-third of their time within the organisations that employ them. Investigating the factors that interfere with employees’ well-being and the organisational environment is becoming an increasing concern in organisations. This article identifies the criteria of the quality of life (QoL), quality of working life (QWL) and organisational climate instruments to point out their similarities. For bibliographic construction and data research, articles were sought in national and international journals, books and dissertations/articles in SciELO, Science Direct, Medline and Pub Med databases. The results show direct relationships amongst QoL, QWL and organisational climate instruments. The relationship between QoL and QWL instruments is based on fair compensation, social interaction, organisational communication, working conditions and functional capacity. QWL and organisational climate instruments are related through social interaction and interfaces. QoL and organisational climate instruments are related based on social interaction, organisational communication, and work conditions.
A Study of Automated Decision Making Systemsinventy
The decision making process of many operations are dependent on analysing very large data sets, previous decisions and their results. The information generated from the large data sets are used as an input for making decisions. Since the decisions to be taken in day to day operations are expanding, the time taken for manual decision making is also expanding. In order to reduce the time, cost and to increase the efficiency and accuracy, which are the most important things for customer satisfaction, many organisations are adopting the automated decision making systems. This paper is about the technologies used for automated decision making systems and the areas in which automated decisions systems works more efficiently and accurately.
Crystallization of L-Glutamic Acid: Mechanism of Heterogeneous β -Form Nuclea...inventy
The mechanism of heterogeneous nucleation of β-form L-glutamic acid was deeply investigated in cooling crystallization. The present study found that the β-form crystals were epitaxially grown on the α-form crystals and they were preferably crystallized on the (011) and (001) surfaces instead of the (111) surfaces of α- form crystals. This result was explained via the molecular simulation. The molecular simulation indicated that the different surfaces of α-form crystals provided different functional groups, resulting in different sites for the heterogeneous nucleation of β-form crystals. Here, the functional group were COO- , C=O and O-H on the (011) and (001) surfaces of α-form crystals, respectively, while it was the NH3 + on the (111) surfaces of α-form crystals. As such, the degree of lattice matching (E) between the β-form crystals and the various surfaces of α- form crystal was distinguished, where the degree of lattice matching (E) between the β-form crystals and the (011), (001) and (111) surfaces of α-form crystal were estimated as 5.30, 5.25 and 2.39, respectively, implying that the (011) and (001) surfaces of α-form crystal were more favorable to generate the heterogeneous nucleation of β-form crystals than the (111) surfaces of α-form crystal
Evaluation of Damage by the Reliability of the Traction Test on Polymer Test ...inventy
In recent decades, polymers have undergone a remarkable historical development and their use has been greatly imposed by gradually dethroning most of the secular materials. These polymer materials have always distinguished themselves by their simple shaping and inexpensive price, their versatility, lightness, and chemical stability but despite their massive use in everyday life as well as in advanced technologies. Generally, these materials still not understood which requires a thorough knowledge of their chemical, physical, rheological and mechanical properties. This paper, we study the mechanical behavior of an amorphous polymer: Acrylonitrile Butadiene Styrene “ABS” by means of uniaxial tensile testing on pierced test pieces with different notch lengths ranging between 1 to 14mm.The proposed approach consists in analyzing the evolution of the global geometry of the obtained strain curves by taking into account the zones and characteristic points of these curves as well as the effect of the damage on the mechanical behavior of the polymer ABS, in order to visualize the evolution of the damage by a static model
Application of Kennelly’model of Running Performances to Elite Endurance Runn...inventy
: The model of Kennelly between distance (Dlim) and exhaustion time (tlim) has been applied to the individual performances of 19 elite endurance runners (World-record holders and Olympic winners) from P. Nurmi (1920-1924) to M. Farah (2012) whose individual best performances on several different distances are known. Kennelly’s model (Dlim = k tlim ) can describe the individual performances of elite runners with a high accuracy (errors lower than 2 %). There is a linear relationship between parameters k and exponents of the elite runners and the extreme values correspond to S. Coe (k = 15.8; = 0.851) and E. Zatopek (k = 6.57; = 0.984). Exponent can be considered as a dimensionless index of aerobic endurance which is close to 1 in the best endurance runners. If it is assumed than maximal aerobic speed can be maintained 7 min in elite endurance runners, exponent is equal to the normalized critical speed (critical speed/maximal aerobic speed) computed from exhaustion times equal to 3 and 12.5 min in these runners.
Development and Application of a Failure Monitoring System by Using the Vibra...inventy
In this project, a failure monitoring system is developed by using the vibration and location information of balises in railway signaling. A lot of field equipment in railway are loosening and broken in time period so that they need maintenance due to the vibrations that occur due to high speed trains traffic and railway vehicles impact. Among the field equipment, balises have very important role of communication in terms of transmitting information to trains. In this scope, it is aimed to make maintenance works more efficient, have no delayed trains, detect previously failure location and intervene in failure timely, by detecting and controlling balise cases such as loosening, out of place and the data consistency error that happens because of balise physical state. In this project, the communication is provided with I2C, Modbus RTU (Remote Terminal Unit) and RS485 standards by using Arduino Uno cards and MPU6050 IMU (Inertial Measurement Unit) sensors in laboratory. Each used sensors are in slave mode and computer interface designed with C# is in master mode. Fault situations in the system are checked instant by the interface. (it is assumed to mount the IMU sensor and the Arduino circuit on the balise) it is seen that the interface responds to the sensor movements instant and the system works well in the end of test processes.
The Management of Protected Areas in Serengeti Ecosystem: A Case Study of Iko...inventy
The study assessed the management of protected areas in Serengeti ecosystem using the case of IGGRs. Specifically, the study aimed at identifying the strategies used for natural resources management; examining the impacts of those strategies; examining the hindrances of the identified strategies; and lastly, examining the methods for scaling up the performance of strategies used for natural resources in the study area. The study involved two villages among 31 villages bordering IGGRs where in each village; at least 5% of the households were sampled. Both Primary data and secondary data were collected and analyzed both manually and computer by using SPSS software. The study revealed that, study population ranked IGGRs performance on protection of natural resources, especially on conserving wildlife for future generation and in reducing poaching to be good(53.3%). In addition, the relationship with IGGRs was said to be considerable good (46.7%). In the aspect of reducing poaching, the findings show that poaching has been reduced by 96.2% from 2009 to 2012. Furthermore, 81.4% of respondents said they use different strategies to control loss of natural resources which in turn has considerably improved the relationship between protected areas and the surrounding communities in some of the aspects. Despite of above successes, the study findings has revealed a number of challenges that hinders the full attainment of conservation objectives. Among the challenges are loss of life and properties (86.4%), shortage of water for livestock (68.9%) since water sources such as Grumeti and Rubana rivers are within protected area while the adjacent local communities do not have a free access to those water sources. Other challenges especially on the IGGRs management include insufficient fund base, working facilities and inadequate staffs. Based on the above findings, the study concluded that the strategies used for natural resources management of protected areas in Serengeti ecosystem is fairly sustainable and need functional participatory approaches of local people and other stakeholders in order to bring about a collaborative natural resources management network in the ecosystem. Furthermore, based on the findings above, equity in benefit sharing accrued from natural resource management in protected areas, more financial support to IGGRs and local community, the use of non-lethal deterrents for crop protection, integration of croplivestock production systems, adoption of land use plans as a solution to land conflicts, strengthens of community based conservation (CBC), adoption of modern information technology such as geographical information system (GIS) and remote sensing are recommended.
Size distribution and biometric relationships of little tunny Euthynnus allet...inventy
This study is taken from data of commercial fishing of the little tunny, Euthynnus alletteratus (Rafinesque, 1810) caught in the Algerian coast, sampled between november 2011 and april 2016. Data were collected in order to determine size distributions of the population and biometric relationships of species including the size - weight relationships. A total of 601 fish ranged from 30.9 and 103 cm fork length (FL) were observed. The size distribution of Euthynnus alletteratus shows multiple modal values witch the most important cohort corresponds to the age class 2 (42-46 cm). The value of the allometric coefficient (b) of the FL/TW relationship is lower than 3, indicating a negative allometric growth.
Removal of Chromium (VI) From Aqueous Solutions Using Discarded Solanum Tuber...inventy
Industrial polluting effluents containing heavy metals are of serious environmental concern in India. Chromium is frequently used in industries like electroplating, metal finishing, cooling towers, dyes, paints, anodizing and leather tanning and is found as traces in effluents finding their way to natural water bodies causing hazardous toxicity to the health of humans, animals and aquatic lives directly or indirectly. Many methods for the removal of Chromium such as chemical reduction, precipitation, ion exchange, electrochemical reduction, evaporation, reverse osmosis and adsorption using activated carbon etc. have been reported but all being expensive and complicated to operate. Experimental practices reveal that adsorption by agricultural and horticultural wastes are quite simple, inexpensive and efficient method. Agra is famous for Potato farming, a lot of discarded potato waste from cold storages is thrown along road side drains causing solid waste generated which either creates solid waste disposal problem or otherwise it finds way to Yamuna river resulting high BOD and posing a serious threat to the aquatic environment. For developing countries like India adsorption studies using discarded potato (Solanum tuberosum) waste from cold storages (DPWC) a solid waste as low cost adsorbent for Chromium removal was dual beneficial i.e., an ideal solution to these solid wastes disposal problem of Agra and removal of Chromium from tannery effluents and thereby saving aquatic life from Chromium contamination in Yamuna river. Keeping this in view batch experiments were designed to study the feasibility of discarded potato waste from cold storages to remove chromium (VI) from the aqueous solutions. During the study various affecting parameters, such as pH, adsorbent does, initial concentration, temperature, contact time, adsorbent grain size and start up agitation speed were optimized as 5.0, 10-20 g/l, 50 mg/l, 250C, 135 minutes, average size and 80 rpm respectively on chromium removal efficiency. Various Isotherms such as Langmuir, Freundlich, Tempkin also fitted suitably and various corresponding constants determined from these Isotherms favor and support the adsorption. Thermodynamic constants ∆G, ∆H and ∆S were found to be 0.267 KJ/mole, 0.288 KJ/mole and 0.0013 KJ/mole respectively.
Effect of Various External and Internal Factors on the Carrier Mobility in n-...inventy
The effect of various external (temperature, electric field, light) and intracrystalline (doping, initial resistivity) factors on the mobility of carriers in layered n-InSe semiconductor experimentally have been investigated. Scientific explanations of the results are proposed
Transient flow analysis for horizontal axial upper-wind turbineinventy
This study is to carry out a transient flow field analysis on the condition that the wind turbine is working to generate turbine, the wind turbine operating conditions change over time, Purpose of this study is try to find out the rule from the wind turbine changing over time . In transient analysis, the wind velocity on inlet boundary and rotation speed in the rotor field will change over time, and an analytical process is provided that can be used for future reference. At present, the wind turbine model is designed on the concept of upwind horizontal axis type. The computer engineering software GH Bladed is used to obtain the relationship between the rotor velocity and the wind turbine. Then the ANSYS engineering software is used to calculate the stress and strain distribution in the blades over time. From the analytical result, the relationship between the stress distribution in the blades and the rotor velocity is got to be used as a reference for future wind turbine structural optimization.
Choice of Numerical Integration Method for Wind Time History Analysis of Tall...inventy
Wind tunnel tests are being performed routinely around the world for designing tall buildings but the advent of powerful computational tools will make time-history analysis for wind more common in near future. As the duration of wind storms ranges from tens of minutes to hours while earthquake durations are typically less than a three to four minutes, the choice of a time step size (Δt) for wind studies needs to be much larger both to reduce the computational time and to save disk space. As the error in any numerical solution of the equation of motion is dependent on step size (Δt), careful investigations on the choice of numerical integration methods for wind analyses are necessary. From a wide variety of integration methods available, it was decided to investigate three methods that seem appropriate for 3D-time history analysis of tall buildings for wind. These are modal time history analysis, the Hilber-Hughes-Taylor (HHT) method or α-method with α=- 0.1, and the Newmark method with β=0.25 and γ=0.5 ( i.e., trapezoidal rule). SAP2000, a common structural analysis software tool, and a 64-story structure are used to conduct all the analyses in this paper. A boundary layer wind tunnel (BLWT) pressure time history measured at 120 locations around the building envelope of a similar structure is used for the analyses. Analyses performed with both the HHT and Newmark-method considering P-delta effects show that second order effects have a considerable impact on both displacement and acceleration response. This result shows that it is necessary to account P-delta effect for wind analysis of tall buildings. As the direct integration time history analysis required very large computation times and very large computer physical memory for a wind duration of hours, a modal analysis with reduced stiffness is considered as a good alternative. For that purpose, a non-linear static analysis of the structure with a load combination of 1.0D + 1.0L is performed in SAP2000 and the reduced stiffness of the structure after the analysis is used to conduct an eigenvalue analysis to extract the mode shapes and frequencies of this structure. Then the first 20- modes are used to perform a modal time history analysis for wind load. The result shows that the responses from modal analysis with “20-mode (reduced stiffness)” are comparable with that from the P-Δ analyses of Newmark-method
Impacts of Demand Side Management on System Reliability Evaluationinventy
Electricity demand in Saudi Arabia is steadily increasing as electrical loads grows at a rate of about 7% per year, this represents a high rate by all standards, and largely due to population growth, as well as due to government subsidies which may lead to prices much lower than actual production cost. This growth represents a challenge that requires Saudi Electricity Company (SEC) to invest huge amounts of money every year, for the construction of additional generation capacity along with the reinforcement of transmission network to meet the consumption growth.Also the demand varies frequently throughout the day, causing a waste of a large part of the energy. SEC believes the optimum solution lies in altering the load shape in order to have a better balance between customer’s consumption and SEC’s generation, This paper describes the method for improving the power system reliability by shifting the portion of peak load to off-peak periods This load management scheme can be achieved by lifting the generation during off peak periods and utilizing the stored energy during peak periods. A hybrid set up involving solar and wind energy along with batteries can also be used to store energy and utilize it during peak periods.
Reliability Evaluation of Riyadh System Incorporating Renewable Generationinventy
In this paper, the experience of Saudi Electricity Company (SEC) in analyzing the generation adequacy for Year 2013 is presented. This analysis is conducted by calculating several reliability indices for Riyadh system hourly load during all four seasonal periods. The reliability indices are gauged against the international utility practice. SEC also plans to introduce renewable energy into the network in order to secure the environmental standards and reduce fuel costs of conventional generation. Thus, the reliability improvement due to different integration levels of Solar and Wind generating sources has also been investigated. The capacity value provided by these variable renewable energy sources (VERs) to reliably meet the system load has been calculated using effective load carrying capability (ELCC) technique with a loss of load expectancy metric.
The effect of reduced pressure acetylene plasma treatment on physical charact...inventy
The capacitors are increasingly being used as energy storage devicesin various power systems. The scientists of the world are tryingto maximize the electrical capacity of the supercapacitors. To achieve this purpose, numerous method sare used: the surface activation of electrodes, the surface etching using the electronbeam, the electrode etching with variousgasplasma, etc. The purpose of this work is toresearch how the properties of carbon electrodes depend on the plasma parameters at whichtheywere formed. The largest surface area ofcarbonelectrodeof47.25m2 /gis obtainedat 15 ofAr/C2H2gasratio. Meanwhile, theSEMimages show that the disruption of structures with low bond energies and the formation of new onesare taking place when the carbon electrodes are etched at acetylene plasma and placed on carbon electrode. The measurements of capacitance showthat capacitors with affectedelectrodes have about10-15% highercapacity than those not treated with acetyleneplasma.
Experimental Investigation of Mini Cooler cum Freezerinventy
In general cases the refrigerator could be converted into an air conditioner by attaching a fan. Thus a cooler as well as freezer is obtained in a single set up. The freezer can be converted to an air conditioner when the outside air is allowed to flow beside the cooling coil and is forced outside by an exhaust fan. In this case a mini scale cooler cum freezer using R134a as refrigerant was fabricated and tested In our mini project work we had designed, fabricated and experimentally analysed a mini cooler cum freezer. From the observations and calculations, the results of mini cooler cum freezer are obtained and are compared.
Growth and Magnetic properties of MnGeP2 thin filmsinventy
We have successfully grown MnGeP2 thin films on GaAs (100) substrate. A ferromagnetic transition near 320 K has been observed by temperature dependent magnetization and resistance measurements. Field dependent magnetization experiments have shown that the coercive fields at 5, 250, and 300 K are 3870, 1380 and 155 Oe, respectively. Magnetoresistance and Hall measurements have displayed that hole conduction is dominant in MnGeP2. PACS: 75.50.Pp, 75.70.-i, 85.70.-w, 73.50.-h
Welocme to ViralQR, your best QR code generator.ViralQR
Welcome to ViralQR, your best QR code generator available on the market!
At ViralQR, we design static and dynamic QR codes. Our mission is to make business operations easier and customer engagement more powerful through the use of QR technology. Be it a small-scale business or a huge enterprise, our easy-to-use platform provides multiple choices that can be tailored according to your company's branding and marketing strategies.
Our Vision
We are here to make the process of creating QR codes easy and smooth, thus enhancing customer interaction and making business more fluid. We very strongly believe in the ability of QR codes to change the world for businesses in their interaction with customers and are set on making that technology accessible and usable far and wide.
Our Achievements
Ever since its inception, we have successfully served many clients by offering QR codes in their marketing, service delivery, and collection of feedback across various industries. Our platform has been recognized for its ease of use and amazing features, which helped a business to make QR codes.
Our Services
At ViralQR, here is a comprehensive suite of services that caters to your very needs:
Static QR Codes: Create free static QR codes. These QR codes are able to store significant information such as URLs, vCards, plain text, emails and SMS, Wi-Fi credentials, and Bitcoin addresses.
Dynamic QR codes: These also have all the advanced features but are subscription-based. They can directly link to PDF files, images, micro-landing pages, social accounts, review forms, business pages, and applications. In addition, they can be branded with CTAs, frames, patterns, colors, and logos to enhance your branding.
Pricing and Packages
Additionally, there is a 14-day free offer to ViralQR, which is an exceptional opportunity for new users to take a feel of this platform. One can easily subscribe from there and experience the full dynamic of using QR codes. The subscription plans are not only meant for business; they are priced very flexibly so that literally every business could afford to benefit from our service.
Why choose us?
ViralQR will provide services for marketing, advertising, catering, retail, and the like. The QR codes can be posted on fliers, packaging, merchandise, and banners, as well as to substitute for cash and cards in a restaurant or coffee shop. With QR codes integrated into your business, improve customer engagement and streamline operations.
Comprehensive Analytics
Subscribers of ViralQR receive detailed analytics and tracking tools in light of having a view of the core values of QR code performance. Our analytics dashboard shows aggregate views and unique views, as well as detailed information about each impression, including time, device, browser, and estimated location by city and country.
So, thank you for choosing ViralQR; we have an offer of nothing but the best in terms of QR code services to meet business diversity!
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™UiPathCommunity
In questo evento online gratuito, organizzato dalla Community Italiana di UiPath, potrai esplorare le nuove funzionalità di Autopilot, il tool che integra l'Intelligenza Artificiale nei processi di sviluppo e utilizzo delle Automazioni.
📕 Vedremo insieme alcuni esempi dell'utilizzo di Autopilot in diversi tool della Suite UiPath:
Autopilot per Studio Web
Autopilot per Studio
Autopilot per Apps
Clipboard AI
GenAI applicata alla Document Understanding
👨🏫👨💻 Speakers:
Stefano Negro, UiPath MVPx3, RPA Tech Lead @ BSP Consultant
Flavio Martinelli, UiPath MVP 2023, Technical Account Manager @UiPath
Andrei Tasca, RPA Solutions Team Lead @NTT Data
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
Essentials of Automations: Optimizing FME Workflows with Parameters
Research Inventy : International Journal of Engineering and Science
1. Research Inventy: International Journal Of Engineering And Science
Vol.3, Issue 5(July 2013), PP 24-29
Issn(e): 2278-4721, Issn(p):2319-6483, Www.Researchinventy.Com
24
Principle Elements and Framework of Internet of Things
1
Bhagyashri Katole, 2
Manikanta Sivapala, 3
Suresh V.
1
(Senior Technical Officer, NISG, C-DAC, Pune, India)
2(Project Engineer, NISG, C-DAC, Pune, India)
3(Joint Director, NISG, C-DAC, Pune, India)
ABSTRACT - The Internet of Things (IoT) is defined as a dynamic environment where uniquely identifiable
things with self configuring capabilities based on standardized and interoperable communication protocols are
integrated into the information network. This paper introduces key enablers of Internet of Things and elaborates
on principle elements of Internet of Things like Machine To Machine (M2M) paradigm, device mobility and
device discovery, communication protocols suitable for IoT environment. It also addresses challenges in Internet
of Things. This paper also discusses about our prototype of IoT based navigation solution and gives overview of
proposed architecture of IoT framework.
KEYWORDS - CoAP (Constrained application protocol), IoT, M2M (Machine to Machine), MQTT (Message
Queue Telemetry Transport), Zero-entropy
I. INTRODUCTION
The Internet of Things (IoT) represents the future of computing and communications. It is world of
information and communication technologies (ICTs) from anytime, anyplace connectivity for anyone; we will
now have connectivity for anything. It semantically means a network of interconnected objects that are uniquely
addressable and connected using standard communication protocols. It will consist of connections that will
multiply and create entirely new dynamic network of networks. In this, objects or things are made as smart so
that they will become knowledgeable and their properties such as transformation, interactions will allow them to
actively interact in environment. For example, RFID tags, sensors and actuators, NFC devices can be made
seamlessly communicated and characterized by properties like modularity, reliability, scalability and
robustness.[1]In Internet of Things, objects or things are made uniquely addressable by using unique way of
identification. These things are heterogeneous in some capabilities. The IoT will provide them a common
environment where these heterogeneous things will be able to communicate with each other using standardized
communication platform. Obviously, these things will need to consume their own energy very carefully so that
they not only to able to communicate for indefinitely long but also form extensive network even when
infrastructure is weak or not available.
The explosion of ubiquitous devices is providing growth in Internet of Things. The Internet of Things
built using four emerging components. The first one is the explosion of the amount of data collected and
exchanged. Business forecasts indicate that in the year 2015 more than 220 Exabyte of data will be stored and
hence for this exponential traffic growth, there is a need to re-think current networking and storage architectures
used in current network. This data flood is responsible to make Internet of Things as reality. The second one is
the energy required to operate the devices will dramatically decreased and hence acquisition of new devices is
necessary to replace old ones. Therefore, the trend can be identified covering all devices that will satisfy the
search for a zero level of entropy where the device or system will have to harvest its own energy. The third one
is amazingly fast happening miniaturization of devices. The fourth is towards autonomic resources so that
system will show properties like self management, self configurable and self healable. These emerging
components make „Things‟ in Internet of Things more responsive and intelligent. The development of new and
more energy efficient compact storage and energy generation devices using upcoming energy harvesting
mechanisms, context awareness intelligence, optimized communication network, integration of solution into
packaged product, interoperability among devices and standards are key enablers for the growth of Internet of
Things. In this paper, section II talks about M2M paradigm, section III describes about device mobility and
device discovery, section IV compares communication protocols suitable for IoT environment, section V
discusses about IoT challenges, section VI discusses about our prototype of IoT based navigation solution,
section VII gives overview about our proposed architecture of IoT framework and conclusion is given in section
VIII.
2. Principle Elements and Framework of Internet of Things
25
II. M2M PARADIGM
Machine to Machine (M2M) is paradigm in which end to end communication is executed without
human intervention connecting various things to IT core network. Here, things involve commercial terminals
that act automatically or on remote request. End to end communication involves network that acts as access and
core network backhaul enabling connectivity taking care of AAA, security, session management and mobility
management. IT core network involves data aggregation and processing involving data caching and also its
interpretation. [2] The M2M refers to technological system that includes both wireless and wired systems to
communicate with other devices of the same ability.
The 'Things' in the IoT, or the 'machines' in M2M, are entities whose identity, state is capable to connect to
IT infrastructure using internet. M2M also uses a thing or device to capture an event, which is controlled by core
network and passed to an application that translates the captured event into meaningful information. It works
with standardized technologies such as TCP/IP, IEEE 802.11 wireless LANs, cellular communications
technologies, and wired networks such as Ethernet. M2M nodes can operate autonomously, push information to
multiple systems and other nodes, and make some decisions on their own. M2M system is eventually used to
become smarter having target that we can make sense out of raw data. It involves two mechanisms i.e. Sense
and Act. Sense mechanism is used to get raw data from various things involved in infrastructure and draws
useful information through perception and interference. After getting knowledgeable information, the system
will perform operations through Act mechanism. For some of procedure of M2M, RESTful style of data
exchange can also be preferred. [2] Various segments and areas like automation, tracing and tracking,
healthcare, remote maintenance and control, metering, consumer electronics, security and payment are trying to
involve M2M technology to work smarter. Today, M2M is primarily being used to collect vast amounts of
machine data and the 'Internet of Things' goes one step further by integrating data from various devices,
allowing humans to intelligently interact with devices, devices with devices and devices back to humans to
provide the ultimate social media collaboration of man and machine.
III. DEVICE MOBILITY AND DEVICE DISCOVERY
Mobility of devices is considered as one of important components of Internet of Things where devices
get connected to each other. Mobility involves two processes. The first process in roaming that involves moving
from one network to another and other process is handover that will involve changing point of attachment when
data flows. Handover also includes delay due to handoff that takes place at several layers like layer 2 (handoff
between AP), layer 3 (IP address acquisition, configuration), authentication, authorization, binding update,
media redirection and rapid handoff will contribute to overall delay and packet loss. Thus, it is essential to
reduce the handoff delay during handover that is introduced at different layers to provide better efficiency to end
users. Mobility can also be categorized as micro mobility that involves mobility within the network and macro
mobility that involves mobility among network domains where IP address changes. [3] There are various causes
of mobility that includes physical movements, radio channels, network performance, sleep schedules and node
failure. End users can bring their own devices in IoT environment as a part of Bring Your Own Device (BYOD)
revolution and hence device mobility is one of the important aspects that need to be considered in Internet of
Things.
The number of IoT devices is extremely large as they cater various applications and services under IoT
and hence discovery of devices that involves the naming and addressing schemes is crucial and difficult. The
IoT system should be flexible in supporting more than one naming schemes. It should support identification of
devices/things of IoT by their names, temporary ID, pseudo-name, location or combination thereof. It shall be
possible to re-use these names and IDs for certain classes of devices or in an environment where resources are
constrained. The naming system should be flexible and should allow plug and play kind of environment.
Addressing in IoT should also support discovery of devices and capabilities. This should be included in the
naming and localization mechanism. Factors dealing with device exchange, failure, location change due to
mobility, or service migration should also be considered in the addressing mechanism. Emphasis should be
given for the use of unique IDs to the devices; such that ID based security can be deployed in future. In short,
the naming and addressing scheme under IoT should have key features like consistency that involves similar
naming format of devices, scalability, uniqueness, interoperability having plug and play support and also
backward compatibility. The IoT system shall allow flexible addressing schemes, including IPv4 and IPv6
addressing, RFIDs, URN (Uniform Resource Naming System), URL [4]. For efficient search and discovery,
metadata and semantic tagging of information will be very important.
3. Principle Elements and Framework of Internet of Things
26
IV. COMMUNICATION PROTOCOLS
The communication protocols will be designed for the Internet of Things platform where all objects or
things are combined to analyze location, intent and even emotions over a network. The integration of machine-
to-machine (M2M) and wireless sensor network (WSN) solutions need established communication services
involving advanced communication protocols that connect smart devices in environment. An IoT application
frequently involves a device or a smart object transmitting information regarding its state, context, or sensory
measurements to other clients or devices.
The IETF Constrained RESTful Environments (CoRE) working group aims to make the REST
paradigm that will available for constrained devices and networks. The main product of the CoRE WG is the
constrained application Protocol (CoAP). CoAP uses an asynchronous approach to support pushing information
from servers to clients: observation. In a GET request, a client can indicate its interest in further updates from a
resource by specifying the “Observe” option. If the server accepts this option, the client becomes an observer of
this resource and receives and asynchronous notification message each time it changes. [5] This functionality
avoids the frequent server polling or keep-alive sessions that clients need to do in the case of an HTTP-based
connection. CoAP has been built over the UDP since the minimally required reliability is achieved through the
transaction layer of the protocol. The CoAP request has the following format:
GET coap://[<iot_device_ipv6_address>]: [<port-number>]/[<resource-URI>]
There is another protocol Message Queue Telemetry Transport (MQTT) that is developed by
researchers at IBM. It is designed as a lightweight publish/subscribe messaging transport connectivity protocol.
It has also been integrated with the IBM websphere application server. The MQTT protocol specification
describes the protocol to be ideally suited for resource-constrained environments where the network runs on
embedded devices with limited processor or memory resources and is expensive, has low bandwidth, or is
unreliable. While MQTT is based on the TCP/IP stack, MQTT-S is an extension for non-TCP/IP stacks, keeping
low-end sensor devices in mind. [6]
There are various communication protocols like MQTT, CoAP, XMPP, SOAP, and UPnP that can be
used in Internet of Things environment having their specific characteristics that can be used to specific scenarios
mentioned in following Table 1.
Table 1: Comparison of communication protocols for IoT environment.
PROTOCOLS MQTT CoAP XMPP SOAP UPnP
XML Based No No Communications
protocol for
message-oriented
middleware based
on XML
Relies on XML
information set
for its message
format
No
TCP/UDP TCP UDP TCP Both TCP and
UDP
UDP
IPv4/IPv6 IPv4,IPv6 IPv4,IPv6 IPv4,IPv6 IPv4 IPv4,IPv6
M2M support OASIS
Standard
ETSI
Standard
--- --- ---
USAGE From
Pervasive
devices to a
server/small
message
broker.
Simple
electronic
devices,
Resource
constrained
devices
Video, File
transfer, gaming,
IoT apps such as
smart grid & social
networking
services
Implementation
of web services
In computer
networks
Permits
networked
devices to
seamlessly
discover each
other presence
on network
In real world application the need may arise where device that uses MQTT may need to communicate with
remote device that only understand CoAP. A solution would be to simply enable the client and the server to
handle both the MQTT and CoAP protocols. But for environment where the processing and memory availability
is highly constrained, implementing multiple protocols on these low-powered devices would not be an ideal
situation. There is need for IoT gateway or middleware that can provide protocol-level interoperability by
translating the data or the meaning of the message from one protocol to another so that interoperability at device
level can be avoided.
4. Principle Elements and Framework of Internet of Things
27
V. CHALLENGES IN IOT
In the IoT technology, hundreds of billions of devices will interact with one another without human
intervention, on a Machine-to-Machine (M2M) basis. They will generate an enormous amount of data at an
unprecedented scale and resolution, giving humans with information and control of events and objects even in
remote physical environments. It involves intercommunication and autonomous M2M data transfer. There are
following challenges in Internet of Things that need to be addressed. [7]
a. Zero-Entropy systems: This involves energy harvesting, energy conservation, energy usage. Energy will be
a major technological challenge, and research must be conducted in order to develop IoT systems that are
able to harvest energy from the environment and not waste any under operation.
b. Scalability: IoT will be composed of trillions of devices. It is not feasible that all devices will be connected
in a mesh, but rather organized in hierarchical sub domains, the number of interconnected object will
outnumber by several orders of magnitude in the current internet.
c. Security and privacy: As there are large numbers of devices are present in the IoT infrastructure, the issue of
having sufficient security on devices with limited capabilities has to be addressed and solved convincingly.
The technological architectures preserving the respect of privacy have to be developed and used as a basis
for any future development.
d. Interoperability: Interoperability among devices and services in IoT infrastructure need to be considered as
important aspect. Interoperability includes consistent standardized platform, standardized testing
methodologies and well suited testing tools. The standardized platform is needed to obtain consistency. The
standardized testing methodologies based on test specifications will specify how to validate devices and
services. The testing tools with accurate test suites will ensure interoperability of devices and services. In
IoT, semantic interoperability becomes imperative for the providers and requestors to communicate
meaningfully with each other despite the heterogeneous nature of the underlying information structures.
e. Standardization and integration: In IoT, multitude of heterogeneous devices communicates and rearranges
their network configuration in an autonomous way. Hence, standards regarding spectrum allocation,
radiation power levels and communication protocols are primary importance. Standards are required for bi-
directional communication and information exchange among things, their environ-ment, and entities that
have an interest in monitoring, controlling, or assisting the things. So, there is need of common
standardization and integration solution in IoT environment.
VI. OVERVIEW OF PROTOTYPE OF IOT BASED NAVIGATION SOLUTION
The IoT based navigation solution enable individuals to navigate through familiar and unfamiliar
environment without assistance of guide by giving speech based instructions. This system is a based on client-
server architecture, where the client is android based smart phone device. The server is capable of providing
navigation directions to multiple clients simultaneously. This system is designed as Proof of Concept (PoC)
phase of NISG in C-DAC, Pune, India. The IoT infrastructure involved following things.
- 3 Linksys WRT54g Wi-Fi access points
- Samsung galaxy S2 mobile (Android OS 2.3.1 based mobile)
The system uses received signal strength indicator (RSSI) based fingerprinting technique in Wi-Fi for IoT
deployment where RSSI is adopted for analysis. To allow signal strength data integrated into the optimized
location based on derived data, effectively received signal strength for each access point was captured. One can
use various site survey tools for this purpose also. The calculation of location of user takes place in two phases:
training phase and tracking phase. The training phase was performed to provide intelligence of location to server
by considering radiomap as collection of points at different location where signal strength is measured. The user
with hand held device is connected to server during tracking phase when online data is compared to offline site
survey data and then current position and navigation instructions are given to user. [8]
In this, the probability of finding correct match of location was significantly improved by using advanced
positioning and routing algorithms and then navigation instructions are given using combination of advanced
navigation algorithms. The experiments performed during this prototype provided foundation for proposing
Internet of Things framework that can eventually be used for indoor and outdoor navigation and also provide
context awareness and intelligence where standardized communication, interoperability and robustness are
considered.
5. Principle Elements and Framework of Internet of Things
28
VII. OVERVIEW OF PROPOSED IOT FRAMEWORK
The proposed Internet of Things framework will take care of standardization, interoperability aspects with
the help of which various domain specific applications can be built. The proposed Internet of Things framework
shown below in Fig. 1 will have the following components:
a. Application Service Layer – This is an independent layer that interoperates with the IoT framework to
provide domain specific and application oriented services.
b. IoT Framework comprises the following layers :
Utility Layer – This layer comprises of utilities that can be used by various applications in application
service layer. The possible utilities for applications like navigation, tracking, location services.
IoT Service Layer – This layer provides various services for interoperability among entities in targeted IoT
environment. This includes various services like device communication service, device management
service, mediator service, security service, location service, data service and external interface service etc.
c. IoT environment represents the network of the physical entities or things in the Internet of Things.
Figure 1 – Proposed IoT framework
The proposed architecture will involve standardized protocol stack that deals with communication among
various devices in IoT infrastructure involving sensors, actuators, Wi-Fi based devices, RFID, NFC devices and
so on. This IoT platform will also be used for implementation of other domain specific applications e.g. citizen
centric applications like public transport assistance, smart house, asset management and tracking and national
security applications etc.
VIII. CONCLUSION
When we look at today‟s state of the technologies, we get a clear indication of how the IoT will be
implemented on a universal level in the coming years. Our proposed IoT framework includes in its components
the capability to fulfill identified requirements in IoT. Here, we also get an indication of the important aspects
that need to be further studied and developed for making large-scale deployment of IoT a reality. While the
current technologies make the concept of IoT feasible, a large number of challenges like standardization, plug
and play based integration that need to be deal with radio frequency electromagnetic compatibility and
interference, cross optimized and energy aware communication protocol stack and also interoperability lie ahead
for making the large-scale real-world deployment of IoT applications. In the next few years, addressing these
challenges will be a powerful driving force for networking and communication research and will also act as key
enablers for Internet of Things.
6. Principle Elements and Framework of Internet of Things
29
REFERENCES
[1] ITU Internet Reports 2005: The Internet of Things – Executive Summary, 2-5
[2] Dr. Sebastian Wahle, Machine Type Communication and M2M Platform Evolution: Horizontal Service
Capabilities or Vertical Silo Mindset?, 3rd IoT Forum, Bled, Slowenia ,2012
[3] XiuJia Jin, A Survey on Network Architectures for Mobility, http://www.cse.wustl.edu/~jain/cse574-
06/ftp/mobility_arch/#TOP
[4] Jayavardhana Gubbi, Rajkumar Buyya, Slaven Marusic, Marimuthu Palaniswa, Internet of Things (IoT): A
Vision, Architectural Elements, and Future Directions, Cornell University Library Open access
http://arxiv.org/pdf/1207.0203.pdf
[5] Carsten Bormann Angelo P. Castellani, Zach Shelby, CoAP: An Application Protocol for Billions of Tiny
Internet Nodes, Proc. IEEE Internet computing, 2012, Volume:16 Issue:2
[6] Urs Hunkeler & Hong Linh Truong, Andy Stanford-Clark, MQTT-S – A Publish/Subscribe Protocol For
Wireless Sensor Networks, Proc. Communication Systems Software and Middleware and Workshops, 2008.
COMSWARE,2008.
[7] Van Kranenburg and Bassi, IoT challenges, SpringerOpen Journal Communications in Mobile Computing,
2012.
[8] E.Mok, G.Retscher, Location determination using WiFi fingerprinting versus WiFi trilateration, Journal of
Location Based Services, Volume 1 Issue 2, June 2007