SlideShare a Scribd company logo
Int. J. Advanced Networking and Applications
Volume: 07 Issue: 01 Pages: 2622-2625 (2015) ISSN: 0975-0290
2622
Monitoring in IOT enabled devices
Udit Gupta
Information Networking Institute, Carnegie Mellon University, Pittsburgh-Pennsylvania, USA
Email: uditg@andrew.cmu.edu
---------------------------------------------------------------ABSTRACT------------------------------------------------------------------
As network size continues to grow exponentially, there has been a proportionate increase in the number of nodes
in the corresponding network. With the advent of Internet of things (IOT), it is assumed that many more devices
will be connected to the existing network infrastructure. As a result, monitoring is expected to get more complex
for administrators as networks tend to become more heterogeneous. Moreover, the addressing for IOTs would be
more complex given the scale at which devices will be added to the network and hence monitoring is bound to
become an uphill task due to management of larger range of addresses. This paper will throw light on what kind
of monitoring mechanisms can be deployed in internet of things (IOTs) and their overall effectiveness.
Keywords – Big Brother (BB), Internet of things (IOT), Monitoring, Simple Network Management Protocol (SNMP),
Zenoss
-------------------------------------------------------------------------------------------------------------------------------------------------
Date of Submission: June 14, 2015 Date of Acceptance: July 21, 2015
-------------------------------------------------------------------------------------------------------------------------------------------------
1. INTRODUCTION
Monitoring [3, 4, 5 and 6] of systems has always been of
prime importance for organizations since the advent of
internet in 1960’s. The abrupt increase in the number of
devices ensured that manually monitoring every device
connected to the network would become infeasible. As
internet expanded to more number of devices which
includes wireless devices, more robust monitoring systems
were designed which were simple to use yet powerful
enough to detect failures. As the wave of virtualization
swept the technology world in early 2000’s, monitoring
systems had to be evolved in order to monitor virtual
machines. As cloud computing [19 and 20] came into
existence over the past decade, monitoring systems had to
be customized according to cloud technology. As world is
looking towards IOTs, it becomes paramount to design
monitoring systems which will be compatible with
different kinds of devices and at the same time detect
intrusions and failures efficiently.
The term ‘Internet of things’ or IOTs [7, 8 and 9] refers to
the networking amongst everyday objects or with a
centralized system. More colloquially, it is the process of
how various ‘things’ which are connected to the internet
interact with each other. Ever since the idea of first
internet based coke machine was conceived at Carnegie
Mellon University in 1982, the idea about extending
internet to entities turned into a reality. This can be
observed in the form of RFID [10, 11 and 12] technology
which provides a unique identity to objects. Apart from
this, iPad controlled lights has gained significant
importance in organizations and homes. To add to this list,
there has been a gradual progress in the research on smart
cars and smart homes [13]. Furthermore, in order to make
IOT a reality a lot of research has been going on in domain
of security issues [1] pertaining to IOT and operating
systems [2] which will be compatible with IOT. It’s
important to have monitoring systems in place which
would ensure that these devices are monitored periodically
and intimates user accordingly.
There are three primary reasons for designing monitoring
systems: intrusion detections [14, 15, 21, 24, 25 and 26],
notifications about critical parameters reaching threshold
and alerts pertaining to failure of the corresponding
machine. Therefore, it’s important that whatever
monitoring systems are deployed onto the architecture
they must analyze all three parameters named above and
must notify user accordingly. Moreover, if the monitoring
system can identify whether encrypted [22, 23 and 24]
connection exists between two nodes then it’ll be of added
advantage to the network as a whole. In this paper, we will
discuss two monitoring agents (Big Brother and Zenoss)
and how they can be utilized in monitoring IOTs.
2. MONITORING SYSTEMS FOR IOTS
Over the past decade, a number of monitoring systems
were designed for effective network administration.
Monitoring data will be present in almost all the nodes in
the network but an efficient system will be able to collect
all this data and present it to administrator in a
comprehensive manner. Some of the monitoring systems
which could meet this criterion are: Nagios, Big Brother,
Ntop, Zenoss and Multi Router Traffic Grapher (MRTG).
Big Brother, Zenoss and Nagios are mostly used as part of
enterprise level monitoring solution since they could
monitor all aspects of the network. On the other hand, the
functionality of Ntop and MRTG are somewhat limited
since they were primarily designed to monitor IP traffic.
Our prime focus henceforth will be on Big Brother and
Zenoss and how they could be deployed in IOTs.
2.1 USING BIG BROTHER (BB) IN IOT
Big Brother (also called BB) is the first monitoring system
to use web as its user interface. This allowed non-technical
users to see the holistic picture and gain an understanding
of network in a simplified manner. BB uses a client-server
model where client will send status information to
monitoring server after certain time intervals. BB can be
effective tool to monitor IOTs. Consider the example of
smart home. Consider an example of smart home which
will have smart refrigerator, smart washing machine and
Int. J. Advanced Networking and Applications
Volume: 07 Issue: 01 Pages: 2622-2625 (2015) ISSN: 0975-0290
2623
smart AC. Let's consider the definitions of each entity
described. Smart refrigerator will adjust its temperature
automatically based on the weather so that electricity
consumption can be optimized. Smart washing machine
will automatically set its washing mode based on the cloth
material and finally smart AC will again be able to adjust
its temperature according to climate outdoors. Each of
these smart devices will operate on sensors or actuators or
both. Hence it is important to maintain a server and a UI,
which will present required information to user on his/her
mobile/tablet. Also a tabular form can be maintained as
shown in table 1 where for sensors/actuators ‘working’
condition is highlighted in green while ‘not working’
condition is highlighted in red. For memory/cpu-utilization
three colors are used to indicate the value above or below
threshold. This table is just an excerpt of a larger table
which will have many more smart things and
corresponding parameters to be analyzed.
2.2 USING ZENOSS IN IOT
Zenoss is an open source platform based on SNMP [16
and 17] protocol and it monitors networks, servers,
applications and services. The biggest advantage of this
monitoring system is that it is an open architecture and
hence users can customize it according to their own needs.
As a result, it is widely used in enterprise solutions. The
functionality of this monitoring system can be extended to
IOTs as well. Given that SNMP is the underlying protocol,
the notification mechanism can be either polling or traps.
Polling would be a better option for most IOT based
devices since metrics can be stored and as a result
historical analysis can be performed. Also configuring
notifications and alarms based on active polling is much
easier as compared to traps. Consider again the example of
smart home described previously: network server can
easily identify via polling the status of smart things.
Metrics will be presented to user in the form of UI and it
will also include data in graphical form.
3. COMPARISON BETWEEN ZENOSS & BB IN IOT
Both BB and Zenoss have been extensively used by
enterprises in the past. Given their wide range of
functionality and ease of deployment they still continue to
be a part of most organizations monitoring framework. As
a result of their ability to provide comprehensive overview
of the network, both can be deployed for monitoring IOT
enabled devices. Both can work in heterogeneous
environment where apart from virtual or physical
machines other network devices like routers, switches can
also be monitored.
But after due consideration of the features being offered
by these two monitoring agents, Zenoss is found to be
slightly better than BB due to multiple reasons. Zenoss is
found to support IPv6 protocol which is bound to gain
paramount importance in case of IOTs due to range of IP
addresses being offered by it. As mentioned previously,
there will be an exponential increase in the number of IOT
enabled devices in the near future and as a result
identifying each device uniquely will be of prime
importance. Therefore, it’s essential to have a protocol in
place which will ensure that numbers of unique tags are
not depleted while identifying IOT devices. IPv6 serves
this purpose quite well. With Zenoss being compatible
with IPv6, its execution in IOT will be less complex.
Secondly, in Zenoss there is provision for both: polling as
well as trap, both of which will be significant as far as IOT
is concerned. Let us consider an example: if a smart car is
being monitored then it is important to gain a periodic
update as to whether it is working properly or not. Thus,
implementing polling becomes inevitable. On the other
hand if something needs to be communicated on an urgent
basis like calling a fire brigade by a smart device then
implementing trap is the only feasible option. With SNMP
offering both these features and given that Zenoss is based
on SNMP, it can safely be assumed to be ideal for IOT.
Finally, it'll easier to manage IOT devices using Zenoss
due to the fact that an MIB [18] file can be created for
each managed object. MIB (management information
base) file is a formal description of a set of network
objects that can be managed using the SNMP. A sample
MIB file for smart home described above has been
mentioned below:
SMART_HOME-MIB DEFINITIONS: = BEGIN
IMPORTS
enterprises
FROM RFC1155-SMI
OBJECT-TYPE
FROM RFC-1212
DisplayString
FROM RFC-1213;
smartAC OBJECT-TYPE
SYNTAX DisplayString
ACCESS read-only
STATUS mandatory
DESCRIPTION
"The description of the smart AC"
smartRefrigerator OBJECT-TYPE
SYNTAX DisplayString
ACCESS read-only
STATUS mandatory
DESCRIPTION
"The description of the smart refrigerator"
smartWashingMachine OBJECT-TYPE
SYNTAX DisplayString
ACCESS read-only
STATUS mandatory
DESCRIPTION
"The description of the smart washing machine"
Int. J. Advanced Networking and Applications
Volume: 07 Issue: 01 Pages: 2622-2625 (2015) ISSN: 0975-0290
2624
Table 1
T
a
b
l
e
1
4. CONCLUSION
While Internet of things (IOT) is yet to mark its arrival in
a substantial way in technology world, it becomes
paramount to address monitoring perspective beforehand.
Some of them were highlighted in this paper and a brief
attempt was to enable the reader to understand the context
in which two of the existing monitoring solutions can be
deployed for IOT enabled devices. Although only two
monitoring systems were presented in this paper which
could be deployed in IOT, there is no denial that other
monitoring systems in the market can also be implemented
as part of IOT enabled devices. But there is no denying the
fact that Big Brother and Zenoss can monitor wide range
of applications which includes processes, events and even
logs. A comparison was presented between these two
monitoring systems and then an inference was drawn
based on certain observations about which would be better
in case of IOT.
ACKNOWLEDGEMENTS
The author is extremely grateful to Dr. Sugata Sanyal for
his invaluable suggestions which led to the improvement
of this paper.
REFERENCES
[1] Tuhin Borgohain, Amardeep Borgohain, Uday
Kumar, Sugata Sanyal, “Authentication Systems in
Internet of Things”, arXiv preprint
arXiv:1502.00870, 2015/2/3
[2] Tuhin Borgohain, Uday Kumar, Sugata Sanyal,
“Survey of Operating Systems for the IoT
Environment”, arXiv preprint arXiv:1504.02517,
2015/4/13
[3] Andreas Hanemann, Jeff W. Boote, Eric L. Boyd,
Jérôme Durand, Loukik Kudarimoti, Roman Łapacz,
D. Martin Swany, Szymon Trocha, Jason Zurawski,
“PerfSONAR: A Service Oriented Architecture for
Multi-domain Network Monitoring”, pp 241-254,
DOI 10.1007/11596141_19, Volume 3826, 2005
[4] Chuck Cranor, Yuan Gao, Theodore Johnson,
Vlaidslav Shkapenyuk, Oliver Spatscheck,
“Gigascope: high performance network monitoring
with an SQL interface”, pages 623, DOI
10.1145/564691.564777, ACM, 2002-06-03
[5] Ferdinand Engel, Kendall S. Jones, Kary Robertson,
David M. Thompson, Gerard White, "Network
Monitoring", US Patent US6115393 A, Sep 5, 2000
[6] Marcus J Ranum,Kent Landfield, Mike Stolarchuk,
Mark Sienkiewicz, Andrew Lambeth, Eric Wall,
"Implementing a generalized tool for network
monitoring", Information Security Technical Report,
Elsevier, 1998
[7] Feng Xia, Laurence T.Yang, Lizhe Wang and
Alexey Vinel, “Internet of Things”,
INTERNATIONAL JOURNAL OF
COMMUNICATION SYSTEMS, Volume 25, Issue
9, pages 1101-1102, September 2012
[8] Kevin Ashton, “That ‘Internet of Things’ Thing”,
RFID journal, June 2009,
http://www.rfidjournal.com/articles/view?4986
[9] Kortuem G, Kawsar F Fitton D, Sundramoorthy V,
“Smart objects as building blocks for internet of
things”, Internet Computing IEEE, Volume 14, Issue
1, Pages 44-51, Feb 2010
[10] A Juels, "RFID security and privacy: A research
survey", Selected Areas in Communications, IEEE
Journal on Volume: 24, Issue: 2, Pages 381 – 394,
Feb 2006
[11] R Want, "An introduction to RFID technology",
Pervasive Computing, IEEE Volume:5, Issue: 1,
Pages 25-33, Jan-March 2006
[12] Battle L, Cole G, Gould K, Rector K, Raymer S,
Balazinska M, Borriello G, “Building the Internet of
Things Using RFID: The RFID Ecosystem
Experience”, Pages 48-55, Volume 13, Issue 3,
Internet Computing IEEE, May-June 2009
[13] D. Bregman, "Smart Home Intelligence – The
eHome that Learns", International Journal of Smart
Home, Volume 4, No. 4, October 2010
[14] Animesh K Trivedi, Rajan Arora, Rishi Kapoor,
Sudip Sanyal and Sugata Sanyal, "A Semi-distributed
Reputation-based Intrusion Detection System for
Mobile Ad hoc Networks”, arXiv preprint
arXiv:1006.1956, 2010/6/10
[15] Manoj Rameshchandra Thakur, Sugata Sanyal, "A
Multi-Dimensional approach towards Intrusion
Detection System", arXiv:1205.2340v1[cs.CR],
2012/5/10
[16] J.D. Case, M. Fedor, M.L. Schoffstall, J. Davin,
"Simple Network Management Protocol (SNMP)",
http://dx.doi.org/10.17487/RFC1157, May 1990
Sensor Actuator Memory CPU utilization
Smart AC Working Working Below threshold Below Threshold
Smart Refrigerator Not working Working Threshold Below Threshold
Smart washing
machine
Working Not working Above Threshold Above Threshold
Int. J. Advanced Networking and Applications
Volume: 07 Issue: 01 Pages: 2622-2625 (2015) ISSN: 0975-0290
2625
[17] William Stallings, "SNMP, SNMPv2, and CMIP: the
practical guide to network management", Book,
ISBN:0-201-63331-0, 1993
[18] David Perkins, Evan McGinnis, "Understanding
SNMP MIBs", Book, ISBN:0-13-437708-7, 1997
[19] Michael Armbrust, Armando Fox, Rean Griffith,
Anthony D. Joseph, Randy Katz, Andy Konwinski,
Gunho Lee, David Patterson, Ariel Rabkin, Ion
Stoica, Matei Zaharia, “A view of cloud computing”,
Communications of the ACM, Volume 53 Issue 4,
Pages 50-58, April 2010
[20] Simon Ostermann, Alexandria Iosup, Nezih
Yigitbasi, Radu Prodan, Thomas Fahringer, Dick
Epema, "A Performance Analysis of EC2 Cloud
Computing Services for Scientific Computing", pp
115-131, DOI 10.1007/978-3-642-12636-9_9, 2010
[21] Ajith Abraham, Ravi Jain, Sugata Sanyal, Sang Yong
Han, "SCIDS: a soft computing intrusion detection
system", Pages 252-257, Book Distributed
Computing-IWDC 2004, 2005/1/1
[22] Dan Boneh, Matt Franklin, "Identity-Based
Encryption from the Weil Pairing", Advances in
Cryptology — CRYPTO 2001, pp 213-229, DOI
10.1007/3-540-44647-8_13, 2001
[23] Ronald L. Rivest, "The RC5 encryption algorithm",
Second International Workshop Leuven, Belgium, pp
86-96, DOI 10.1007/3-540-60590-8_7, December
14–16, 1994
[24] Brent Waters, "Efficient Identity-Based Encryption
Without Random Oracles", 24th Annual International
Conference on the Theory and Applications of
Cryptographic Techniques, Aarhus, Denmark, pp
114-127, May 22-26, 2005
[25] Animesh Kr. Trivedi, Rishi Kapoor, Rajan Arora,
Sudip Sanyal, Sugata Sanyal, "RISM - Reputation
Based Intrusion Detection System for Mobile Ad hoc
Networks", Third International Conference on
Computers and Devices for Communications
CODEC-06, pages 234-237, 2006
[26] Divyata Dal, Siby Abraham, Ajith Abraham, Sugata
Sanyal, Mukund Sanglikar, "Evolution induced
secondary immunity: An artificial immune system
based intrusion detection system", Computer
Information Systems and Industrial Management
Applications, Pages 65-70, IEEE, 2008

More Related Content

What's hot

Introduction and Concepts of IoT
Introduction and Concepts of IoTIntroduction and Concepts of IoT
Introduction and Concepts of IoT
Vikram Nandini
 
WIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVES
WIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVESWIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVES
WIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVES
IJCNCJournal
 
Industrial Iot and Legacy Scada system - the solution for future ?
Industrial Iot and Legacy Scada system - the solution for future ?Industrial Iot and Legacy Scada system - the solution for future ?
Industrial Iot and Legacy Scada system - the solution for future ?
Prescinto Technologies Private Limited
 
WIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVES
WIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVESWIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVES
WIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVES
csandit
 
IoT with 5G-Network
IoT with 5G-NetworkIoT with 5G-Network
IoT with 5G-Network
Belal Ashraf
 
Internet of Things and its applications
Internet of Things and its applicationsInternet of Things and its applications
Internet of Things and its applications
Pasquale Puzio
 
IoT - RPi to Salesforce
IoT - RPi to SalesforceIoT - RPi to Salesforce
IoT - RPi to Salesforce
Venkat Garikapati
 
Integration of internet of things with wireless sensor network
Integration of internet of things with wireless sensor networkIntegration of internet of things with wireless sensor network
Integration of internet of things with wireless sensor network
IJECEIAES
 
Questions in iot
Questions in iotQuestions in iot
Questions in iot
vishal choudhary
 
Lecture 11
Lecture 11Lecture 11
Lecture 11
vishal choudhary
 
Lecture 4
Lecture  4Lecture  4
Lecture 4
vishal choudhary
 
Seminar report
Seminar reportSeminar report
Seminar report
archana lisbon
 
A Review: The Internet of Things Using Fog Computing
A Review: The Internet of Things Using Fog ComputingA Review: The Internet of Things Using Fog Computing
A Review: The Internet of Things Using Fog Computing
IRJET Journal
 
Summer Internship report on IOT RTTC Trivandrum
Summer Internship report on IOT  RTTC TrivandrumSummer Internship report on IOT  RTTC Trivandrum
Summer Internship report on IOT RTTC Trivandrum
FathimaCec
 
Effect of Mixing and Compaction Temperatures on the Indirect Tensile Strength...
Effect of Mixing and Compaction Temperatures on the Indirect Tensile Strength...Effect of Mixing and Compaction Temperatures on the Indirect Tensile Strength...
Effect of Mixing and Compaction Temperatures on the Indirect Tensile Strength...
IRJET Journal
 
IEEE Radio & Wireless Week IoT Powered by Wireless Presentation
IEEE Radio & Wireless Week IoT Powered by Wireless PresentationIEEE Radio & Wireless Week IoT Powered by Wireless Presentation
IEEE Radio & Wireless Week IoT Powered by Wireless Presentation
Mark Goldstein
 
Lecture 14
Lecture 14Lecture 14
Lecture 14
vishal choudhary
 
The technology behind the internet of things -C&T RF Antennas Inc
The technology behind the internet of things -C&T RF Antennas IncThe technology behind the internet of things -C&T RF Antennas Inc
The technology behind the internet of things -C&T RF Antennas Inc
Antenna Manufacturer Coco
 
Internet of Things (IoT) - Trends, Challenges and Opportunities
Internet of Things (IoT) - Trends, Challenges and OpportunitiesInternet of Things (IoT) - Trends, Challenges and Opportunities
Internet of Things (IoT) - Trends, Challenges and Opportunities
Dr. Mazlan Abbas
 
Is Your Network Ready for the Age of IoT?
Is Your Network Ready for the Age of IoT?Is Your Network Ready for the Age of IoT?
Is Your Network Ready for the Age of IoT?
GENIANS, INC.
 

What's hot (20)

Introduction and Concepts of IoT
Introduction and Concepts of IoTIntroduction and Concepts of IoT
Introduction and Concepts of IoT
 
WIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVES
WIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVESWIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVES
WIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVES
 
Industrial Iot and Legacy Scada system - the solution for future ?
Industrial Iot and Legacy Scada system - the solution for future ?Industrial Iot and Legacy Scada system - the solution for future ?
Industrial Iot and Legacy Scada system - the solution for future ?
 
WIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVES
WIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVESWIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVES
WIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVES
 
IoT with 5G-Network
IoT with 5G-NetworkIoT with 5G-Network
IoT with 5G-Network
 
Internet of Things and its applications
Internet of Things and its applicationsInternet of Things and its applications
Internet of Things and its applications
 
IoT - RPi to Salesforce
IoT - RPi to SalesforceIoT - RPi to Salesforce
IoT - RPi to Salesforce
 
Integration of internet of things with wireless sensor network
Integration of internet of things with wireless sensor networkIntegration of internet of things with wireless sensor network
Integration of internet of things with wireless sensor network
 
Questions in iot
Questions in iotQuestions in iot
Questions in iot
 
Lecture 11
Lecture 11Lecture 11
Lecture 11
 
Lecture 4
Lecture  4Lecture  4
Lecture 4
 
Seminar report
Seminar reportSeminar report
Seminar report
 
A Review: The Internet of Things Using Fog Computing
A Review: The Internet of Things Using Fog ComputingA Review: The Internet of Things Using Fog Computing
A Review: The Internet of Things Using Fog Computing
 
Summer Internship report on IOT RTTC Trivandrum
Summer Internship report on IOT  RTTC TrivandrumSummer Internship report on IOT  RTTC Trivandrum
Summer Internship report on IOT RTTC Trivandrum
 
Effect of Mixing and Compaction Temperatures on the Indirect Tensile Strength...
Effect of Mixing and Compaction Temperatures on the Indirect Tensile Strength...Effect of Mixing and Compaction Temperatures on the Indirect Tensile Strength...
Effect of Mixing and Compaction Temperatures on the Indirect Tensile Strength...
 
IEEE Radio & Wireless Week IoT Powered by Wireless Presentation
IEEE Radio & Wireless Week IoT Powered by Wireless PresentationIEEE Radio & Wireless Week IoT Powered by Wireless Presentation
IEEE Radio & Wireless Week IoT Powered by Wireless Presentation
 
Lecture 14
Lecture 14Lecture 14
Lecture 14
 
The technology behind the internet of things -C&T RF Antennas Inc
The technology behind the internet of things -C&T RF Antennas IncThe technology behind the internet of things -C&T RF Antennas Inc
The technology behind the internet of things -C&T RF Antennas Inc
 
Internet of Things (IoT) - Trends, Challenges and Opportunities
Internet of Things (IoT) - Trends, Challenges and OpportunitiesInternet of Things (IoT) - Trends, Challenges and Opportunities
Internet of Things (IoT) - Trends, Challenges and Opportunities
 
Is Your Network Ready for the Age of IoT?
Is Your Network Ready for the Age of IoT?Is Your Network Ready for the Age of IoT?
Is Your Network Ready for the Age of IoT?
 

Similar to Monitoring in IOT enabled devices

Green House Automation using IoT
Green House Automation using IoT Green House Automation using IoT
Green House Automation using IoT
IRJET Journal
 
A REVIEW PAPER ON “IOT” & FUTURE RESEARCH IN INTERNET APPLICATIONS
A REVIEW PAPER ON “IOT” & FUTURE RESEARCH IN INTERNET APPLICATIONSA REVIEW PAPER ON “IOT” & FUTURE RESEARCH IN INTERNET APPLICATIONS
A REVIEW PAPER ON “IOT” & FUTURE RESEARCH IN INTERNET APPLICATIONS
IRJET Journal
 
iot-full-notes-iot-for-smart-systems.pdf
iot-full-notes-iot-for-smart-systems.pdfiot-full-notes-iot-for-smart-systems.pdf
iot-full-notes-iot-for-smart-systems.pdf
RamithaDevi
 
IRJET- A Inference Model for Environment Detection using IoT and SVM
IRJET- A Inference Model for Environment Detection using IoT and SVMIRJET- A Inference Model for Environment Detection using IoT and SVM
IRJET- A Inference Model for Environment Detection using IoT and SVM
IRJET Journal
 
TheInternetofThings
TheInternetofThingsTheInternetofThings
TheInternetofThingsKimmiegrif
 
Simulation, modelling and packet sniffing facilities for IoT: A systematic an...
Simulation, modelling and packet sniffing facilities for IoT: A systematic an...Simulation, modelling and packet sniffing facilities for IoT: A systematic an...
Simulation, modelling and packet sniffing facilities for IoT: A systematic an...
IJECEIAES
 
Unit 3 - Internet of Things - www.rgpvnotes.in.pdf
Unit 3 - Internet of Things - www.rgpvnotes.in.pdfUnit 3 - Internet of Things - www.rgpvnotes.in.pdf
Unit 3 - Internet of Things - www.rgpvnotes.in.pdf
ShubhamYadav73126
 
IRJET- A Review Paper on Internet of Things(IoT) and its Applications
IRJET- A Review Paper on Internet of Things(IoT) and its ApplicationsIRJET- A Review Paper on Internet of Things(IoT) and its Applications
IRJET- A Review Paper on Internet of Things(IoT) and its Applications
IRJET Journal
 
IRJET- Home Automation using IoT: Review
IRJET- Home Automation using IoT: ReviewIRJET- Home Automation using IoT: Review
IRJET- Home Automation using IoT: Review
IRJET Journal
 
Development of web-based surveillance system for Internet of Things (IoT) app...
Development of web-based surveillance system for Internet of Things (IoT) app...Development of web-based surveillance system for Internet of Things (IoT) app...
Development of web-based surveillance system for Internet of Things (IoT) app...
journalBEEI
 
IoT ( M2M) - Big Data - Analytics: Emulation and Demonstration
IoT ( M2M) - Big Data - Analytics: Emulation and DemonstrationIoT ( M2M) - Big Data - Analytics: Emulation and Demonstration
IoT ( M2M) - Big Data - Analytics: Emulation and Demonstration
CHAKER ALLAOUI
 
IRJET-A Review: IoT and Cloud Computing for Future Internet
IRJET-A Review: IoT and Cloud Computing for Future InternetIRJET-A Review: IoT and Cloud Computing for Future Internet
IRJET-A Review: IoT and Cloud Computing for Future Internet
IRJET Journal
 
Unit_1_IOT_INTRO.pptx
Unit_1_IOT_INTRO.pptxUnit_1_IOT_INTRO.pptx
Unit_1_IOT_INTRO.pptx
Bharat Tank
 
Implementation of IoT in Agriculture: A Scientific Approach for Smart Irriga...
Implementation of IoT in Agriculture: A Scientific  Approach for Smart Irriga...Implementation of IoT in Agriculture: A Scientific  Approach for Smart Irriga...
Implementation of IoT in Agriculture: A Scientific Approach for Smart Irriga...
Springer
 
F5 Networks: The Internet of Things - Ready Infrastructure
F5 Networks: The Internet of Things - Ready InfrastructureF5 Networks: The Internet of Things - Ready Infrastructure
F5 Networks: The Internet of Things - Ready Infrastructure
F5 Networks
 
E-Toll Payment Using Azure Cloud
E-Toll Payment Using Azure CloudE-Toll Payment Using Azure Cloud
E-Toll Payment Using Azure Cloud
IRJET Journal
 
IRJET - Survey on Smart System for Non Smart Devices using Raspberry PI3b & G...
IRJET - Survey on Smart System for Non Smart Devices using Raspberry PI3b & G...IRJET - Survey on Smart System for Non Smart Devices using Raspberry PI3b & G...
IRJET - Survey on Smart System for Non Smart Devices using Raspberry PI3b & G...
IRJET Journal
 
INTERNET OF THINGS
INTERNET OF THINGSINTERNET OF THINGS
INTERNET OF THINGS
akashkumar1540
 
IRJET- Plug and Play Approach: Sensors to Cloud Communication
IRJET- Plug and Play Approach: Sensors to Cloud CommunicationIRJET- Plug and Play Approach: Sensors to Cloud Communication
IRJET- Plug and Play Approach: Sensors to Cloud Communication
IRJET Journal
 
IOT_PPT1.pdf
IOT_PPT1.pdfIOT_PPT1.pdf
IOT_PPT1.pdf
laxmikanth45
 

Similar to Monitoring in IOT enabled devices (20)

Green House Automation using IoT
Green House Automation using IoT Green House Automation using IoT
Green House Automation using IoT
 
A REVIEW PAPER ON “IOT” & FUTURE RESEARCH IN INTERNET APPLICATIONS
A REVIEW PAPER ON “IOT” & FUTURE RESEARCH IN INTERNET APPLICATIONSA REVIEW PAPER ON “IOT” & FUTURE RESEARCH IN INTERNET APPLICATIONS
A REVIEW PAPER ON “IOT” & FUTURE RESEARCH IN INTERNET APPLICATIONS
 
iot-full-notes-iot-for-smart-systems.pdf
iot-full-notes-iot-for-smart-systems.pdfiot-full-notes-iot-for-smart-systems.pdf
iot-full-notes-iot-for-smart-systems.pdf
 
IRJET- A Inference Model for Environment Detection using IoT and SVM
IRJET- A Inference Model for Environment Detection using IoT and SVMIRJET- A Inference Model for Environment Detection using IoT and SVM
IRJET- A Inference Model for Environment Detection using IoT and SVM
 
TheInternetofThings
TheInternetofThingsTheInternetofThings
TheInternetofThings
 
Simulation, modelling and packet sniffing facilities for IoT: A systematic an...
Simulation, modelling and packet sniffing facilities for IoT: A systematic an...Simulation, modelling and packet sniffing facilities for IoT: A systematic an...
Simulation, modelling and packet sniffing facilities for IoT: A systematic an...
 
Unit 3 - Internet of Things - www.rgpvnotes.in.pdf
Unit 3 - Internet of Things - www.rgpvnotes.in.pdfUnit 3 - Internet of Things - www.rgpvnotes.in.pdf
Unit 3 - Internet of Things - www.rgpvnotes.in.pdf
 
IRJET- A Review Paper on Internet of Things(IoT) and its Applications
IRJET- A Review Paper on Internet of Things(IoT) and its ApplicationsIRJET- A Review Paper on Internet of Things(IoT) and its Applications
IRJET- A Review Paper on Internet of Things(IoT) and its Applications
 
IRJET- Home Automation using IoT: Review
IRJET- Home Automation using IoT: ReviewIRJET- Home Automation using IoT: Review
IRJET- Home Automation using IoT: Review
 
Development of web-based surveillance system for Internet of Things (IoT) app...
Development of web-based surveillance system for Internet of Things (IoT) app...Development of web-based surveillance system for Internet of Things (IoT) app...
Development of web-based surveillance system for Internet of Things (IoT) app...
 
IoT ( M2M) - Big Data - Analytics: Emulation and Demonstration
IoT ( M2M) - Big Data - Analytics: Emulation and DemonstrationIoT ( M2M) - Big Data - Analytics: Emulation and Demonstration
IoT ( M2M) - Big Data - Analytics: Emulation and Demonstration
 
IRJET-A Review: IoT and Cloud Computing for Future Internet
IRJET-A Review: IoT and Cloud Computing for Future InternetIRJET-A Review: IoT and Cloud Computing for Future Internet
IRJET-A Review: IoT and Cloud Computing for Future Internet
 
Unit_1_IOT_INTRO.pptx
Unit_1_IOT_INTRO.pptxUnit_1_IOT_INTRO.pptx
Unit_1_IOT_INTRO.pptx
 
Implementation of IoT in Agriculture: A Scientific Approach for Smart Irriga...
Implementation of IoT in Agriculture: A Scientific  Approach for Smart Irriga...Implementation of IoT in Agriculture: A Scientific  Approach for Smart Irriga...
Implementation of IoT in Agriculture: A Scientific Approach for Smart Irriga...
 
F5 Networks: The Internet of Things - Ready Infrastructure
F5 Networks: The Internet of Things - Ready InfrastructureF5 Networks: The Internet of Things - Ready Infrastructure
F5 Networks: The Internet of Things - Ready Infrastructure
 
E-Toll Payment Using Azure Cloud
E-Toll Payment Using Azure CloudE-Toll Payment Using Azure Cloud
E-Toll Payment Using Azure Cloud
 
IRJET - Survey on Smart System for Non Smart Devices using Raspberry PI3b & G...
IRJET - Survey on Smart System for Non Smart Devices using Raspberry PI3b & G...IRJET - Survey on Smart System for Non Smart Devices using Raspberry PI3b & G...
IRJET - Survey on Smart System for Non Smart Devices using Raspberry PI3b & G...
 
INTERNET OF THINGS
INTERNET OF THINGSINTERNET OF THINGS
INTERNET OF THINGS
 
IRJET- Plug and Play Approach: Sensors to Cloud Communication
IRJET- Plug and Play Approach: Sensors to Cloud CommunicationIRJET- Plug and Play Approach: Sensors to Cloud Communication
IRJET- Plug and Play Approach: Sensors to Cloud Communication
 
IOT_PPT1.pdf
IOT_PPT1.pdfIOT_PPT1.pdf
IOT_PPT1.pdf
 

More from Eswar Publications

Content-Based Image Retrieval Features: A Survey
Content-Based Image Retrieval Features: A SurveyContent-Based Image Retrieval Features: A Survey
Content-Based Image Retrieval Features: A Survey
Eswar Publications
 
Clickjacking Attack: Hijacking User’s Click
Clickjacking Attack: Hijacking User’s ClickClickjacking Attack: Hijacking User’s Click
Clickjacking Attack: Hijacking User’s Click
Eswar Publications
 
Performance Analysis of Audio and Video Synchronization using Spreaded Code D...
Performance Analysis of Audio and Video Synchronization using Spreaded Code D...Performance Analysis of Audio and Video Synchronization using Spreaded Code D...
Performance Analysis of Audio and Video Synchronization using Spreaded Code D...
Eswar Publications
 
Android Based Home-Automation using Microcontroller
Android Based Home-Automation using MicrocontrollerAndroid Based Home-Automation using Microcontroller
Android Based Home-Automation using Microcontroller
Eswar Publications
 
Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...
Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...
Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...
Eswar Publications
 
App for Physiological Seed quality Parameters
App for Physiological Seed quality ParametersApp for Physiological Seed quality Parameters
App for Physiological Seed quality Parameters
Eswar Publications
 
What happens when adaptive video streaming players compete in time-varying ba...
What happens when adaptive video streaming players compete in time-varying ba...What happens when adaptive video streaming players compete in time-varying ba...
What happens when adaptive video streaming players compete in time-varying ba...
Eswar Publications
 
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection System
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection SystemWLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection System
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection System
Eswar Publications
 
Spreading Trade Union Activities through Cyberspace: A Case Study
Spreading Trade Union Activities through Cyberspace: A Case StudySpreading Trade Union Activities through Cyberspace: A Case Study
Spreading Trade Union Activities through Cyberspace: A Case Study
Eswar Publications
 
Identifying an Appropriate Model for Information Systems Integration in the O...
Identifying an Appropriate Model for Information Systems Integration in the O...Identifying an Appropriate Model for Information Systems Integration in the O...
Identifying an Appropriate Model for Information Systems Integration in the O...
Eswar Publications
 
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...
Eswar Publications
 
Bridging Centrality: Identifying Bridging Nodes in Transportation Network
Bridging Centrality: Identifying Bridging Nodes in Transportation NetworkBridging Centrality: Identifying Bridging Nodes in Transportation Network
Bridging Centrality: Identifying Bridging Nodes in Transportation Network
Eswar Publications
 
A Literature Survey on Internet of Things (IoT)
A Literature Survey on Internet of Things (IoT)A Literature Survey on Internet of Things (IoT)
A Literature Survey on Internet of Things (IoT)
Eswar Publications
 
Automatic Monitoring of Soil Moisture and Controlling of Irrigation System
Automatic Monitoring of Soil Moisture and Controlling of Irrigation SystemAutomatic Monitoring of Soil Moisture and Controlling of Irrigation System
Automatic Monitoring of Soil Moisture and Controlling of Irrigation System
Eswar Publications
 
Multi- Level Data Security Model for Big Data on Public Cloud: A New Model
Multi- Level Data Security Model for Big Data on Public Cloud: A New ModelMulti- Level Data Security Model for Big Data on Public Cloud: A New Model
Multi- Level Data Security Model for Big Data on Public Cloud: A New Model
Eswar Publications
 
Impact of Technology on E-Banking; Cameroon Perspectives
Impact of Technology on E-Banking; Cameroon PerspectivesImpact of Technology on E-Banking; Cameroon Perspectives
Impact of Technology on E-Banking; Cameroon Perspectives
Eswar Publications
 
Classification Algorithms with Attribute Selection: an evaluation study using...
Classification Algorithms with Attribute Selection: an evaluation study using...Classification Algorithms with Attribute Selection: an evaluation study using...
Classification Algorithms with Attribute Selection: an evaluation study using...
Eswar Publications
 
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...Mining Frequent Patterns and Associations from the Smart meters using Bayesia...
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...
Eswar Publications
 
Network as a Service Model in Cloud Authentication by HMAC Algorithm
Network as a Service Model in Cloud Authentication by HMAC AlgorithmNetwork as a Service Model in Cloud Authentication by HMAC Algorithm
Network as a Service Model in Cloud Authentication by HMAC Algorithm
Eswar Publications
 
Explosive Detection Approach by Printed Antennas
Explosive Detection Approach by Printed AntennasExplosive Detection Approach by Printed Antennas
Explosive Detection Approach by Printed Antennas
Eswar Publications
 

More from Eswar Publications (20)

Content-Based Image Retrieval Features: A Survey
Content-Based Image Retrieval Features: A SurveyContent-Based Image Retrieval Features: A Survey
Content-Based Image Retrieval Features: A Survey
 
Clickjacking Attack: Hijacking User’s Click
Clickjacking Attack: Hijacking User’s ClickClickjacking Attack: Hijacking User’s Click
Clickjacking Attack: Hijacking User’s Click
 
Performance Analysis of Audio and Video Synchronization using Spreaded Code D...
Performance Analysis of Audio and Video Synchronization using Spreaded Code D...Performance Analysis of Audio and Video Synchronization using Spreaded Code D...
Performance Analysis of Audio and Video Synchronization using Spreaded Code D...
 
Android Based Home-Automation using Microcontroller
Android Based Home-Automation using MicrocontrollerAndroid Based Home-Automation using Microcontroller
Android Based Home-Automation using Microcontroller
 
Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...
Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...
Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...
 
App for Physiological Seed quality Parameters
App for Physiological Seed quality ParametersApp for Physiological Seed quality Parameters
App for Physiological Seed quality Parameters
 
What happens when adaptive video streaming players compete in time-varying ba...
What happens when adaptive video streaming players compete in time-varying ba...What happens when adaptive video streaming players compete in time-varying ba...
What happens when adaptive video streaming players compete in time-varying ba...
 
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection System
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection SystemWLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection System
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection System
 
Spreading Trade Union Activities through Cyberspace: A Case Study
Spreading Trade Union Activities through Cyberspace: A Case StudySpreading Trade Union Activities through Cyberspace: A Case Study
Spreading Trade Union Activities through Cyberspace: A Case Study
 
Identifying an Appropriate Model for Information Systems Integration in the O...
Identifying an Appropriate Model for Information Systems Integration in the O...Identifying an Appropriate Model for Information Systems Integration in the O...
Identifying an Appropriate Model for Information Systems Integration in the O...
 
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...
 
Bridging Centrality: Identifying Bridging Nodes in Transportation Network
Bridging Centrality: Identifying Bridging Nodes in Transportation NetworkBridging Centrality: Identifying Bridging Nodes in Transportation Network
Bridging Centrality: Identifying Bridging Nodes in Transportation Network
 
A Literature Survey on Internet of Things (IoT)
A Literature Survey on Internet of Things (IoT)A Literature Survey on Internet of Things (IoT)
A Literature Survey on Internet of Things (IoT)
 
Automatic Monitoring of Soil Moisture and Controlling of Irrigation System
Automatic Monitoring of Soil Moisture and Controlling of Irrigation SystemAutomatic Monitoring of Soil Moisture and Controlling of Irrigation System
Automatic Monitoring of Soil Moisture and Controlling of Irrigation System
 
Multi- Level Data Security Model for Big Data on Public Cloud: A New Model
Multi- Level Data Security Model for Big Data on Public Cloud: A New ModelMulti- Level Data Security Model for Big Data on Public Cloud: A New Model
Multi- Level Data Security Model for Big Data on Public Cloud: A New Model
 
Impact of Technology on E-Banking; Cameroon Perspectives
Impact of Technology on E-Banking; Cameroon PerspectivesImpact of Technology on E-Banking; Cameroon Perspectives
Impact of Technology on E-Banking; Cameroon Perspectives
 
Classification Algorithms with Attribute Selection: an evaluation study using...
Classification Algorithms with Attribute Selection: an evaluation study using...Classification Algorithms with Attribute Selection: an evaluation study using...
Classification Algorithms with Attribute Selection: an evaluation study using...
 
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...Mining Frequent Patterns and Associations from the Smart meters using Bayesia...
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...
 
Network as a Service Model in Cloud Authentication by HMAC Algorithm
Network as a Service Model in Cloud Authentication by HMAC AlgorithmNetwork as a Service Model in Cloud Authentication by HMAC Algorithm
Network as a Service Model in Cloud Authentication by HMAC Algorithm
 
Explosive Detection Approach by Printed Antennas
Explosive Detection Approach by Printed AntennasExplosive Detection Approach by Printed Antennas
Explosive Detection Approach by Printed Antennas
 

Recently uploaded

Literature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptxLiterature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptx
Dr Ramhari Poudyal
 
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdf
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdfTutorial for 16S rRNA Gene Analysis with QIIME2.pdf
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdf
aqil azizi
 
ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024
Rahul
 
Hierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power SystemHierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power System
Kerry Sado
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
obonagu
 
Fundamentals of Induction Motor Drives.pptx
Fundamentals of Induction Motor Drives.pptxFundamentals of Induction Motor Drives.pptx
Fundamentals of Induction Motor Drives.pptx
manasideore6
 
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
zwunae
 
digital fundamental by Thomas L.floydl.pdf
digital fundamental by Thomas L.floydl.pdfdigital fundamental by Thomas L.floydl.pdf
digital fundamental by Thomas L.floydl.pdf
drwaing
 
6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)
ClaraZara1
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
thanhdowork
 
Technical Drawings introduction to drawing of prisms
Technical Drawings introduction to drawing of prismsTechnical Drawings introduction to drawing of prisms
Technical Drawings introduction to drawing of prisms
heavyhaig
 
bank management system in java and mysql report1.pdf
bank management system in java and mysql report1.pdfbank management system in java and mysql report1.pdf
bank management system in java and mysql report1.pdf
Divyam548318
 
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTSHeap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
Soumen Santra
 
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
insn4465
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
JoytuBarua2
 
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsKuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
Victor Morales
 
一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单专业办理
一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单专业办理一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单专业办理
一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单专业办理
zwunae
 
Modelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdfModelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdf
camseq
 
Water billing management system project report.pdf
Water billing management system project report.pdfWater billing management system project report.pdf
Water billing management system project report.pdf
Kamal Acharya
 
DfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributionsDfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributions
gestioneergodomus
 

Recently uploaded (20)

Literature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptxLiterature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptx
 
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdf
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdfTutorial for 16S rRNA Gene Analysis with QIIME2.pdf
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdf
 
ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024
 
Hierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power SystemHierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power System
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
 
Fundamentals of Induction Motor Drives.pptx
Fundamentals of Induction Motor Drives.pptxFundamentals of Induction Motor Drives.pptx
Fundamentals of Induction Motor Drives.pptx
 
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
 
digital fundamental by Thomas L.floydl.pdf
digital fundamental by Thomas L.floydl.pdfdigital fundamental by Thomas L.floydl.pdf
digital fundamental by Thomas L.floydl.pdf
 
6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
 
Technical Drawings introduction to drawing of prisms
Technical Drawings introduction to drawing of prismsTechnical Drawings introduction to drawing of prisms
Technical Drawings introduction to drawing of prisms
 
bank management system in java and mysql report1.pdf
bank management system in java and mysql report1.pdfbank management system in java and mysql report1.pdf
bank management system in java and mysql report1.pdf
 
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTSHeap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
 
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
 
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsKuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
 
一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单专业办理
一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单专业办理一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单专业办理
一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单专业办理
 
Modelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdfModelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdf
 
Water billing management system project report.pdf
Water billing management system project report.pdfWater billing management system project report.pdf
Water billing management system project report.pdf
 
DfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributionsDfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributions
 

Monitoring in IOT enabled devices

  • 1. Int. J. Advanced Networking and Applications Volume: 07 Issue: 01 Pages: 2622-2625 (2015) ISSN: 0975-0290 2622 Monitoring in IOT enabled devices Udit Gupta Information Networking Institute, Carnegie Mellon University, Pittsburgh-Pennsylvania, USA Email: uditg@andrew.cmu.edu ---------------------------------------------------------------ABSTRACT------------------------------------------------------------------ As network size continues to grow exponentially, there has been a proportionate increase in the number of nodes in the corresponding network. With the advent of Internet of things (IOT), it is assumed that many more devices will be connected to the existing network infrastructure. As a result, monitoring is expected to get more complex for administrators as networks tend to become more heterogeneous. Moreover, the addressing for IOTs would be more complex given the scale at which devices will be added to the network and hence monitoring is bound to become an uphill task due to management of larger range of addresses. This paper will throw light on what kind of monitoring mechanisms can be deployed in internet of things (IOTs) and their overall effectiveness. Keywords – Big Brother (BB), Internet of things (IOT), Monitoring, Simple Network Management Protocol (SNMP), Zenoss ------------------------------------------------------------------------------------------------------------------------------------------------- Date of Submission: June 14, 2015 Date of Acceptance: July 21, 2015 ------------------------------------------------------------------------------------------------------------------------------------------------- 1. INTRODUCTION Monitoring [3, 4, 5 and 6] of systems has always been of prime importance for organizations since the advent of internet in 1960’s. The abrupt increase in the number of devices ensured that manually monitoring every device connected to the network would become infeasible. As internet expanded to more number of devices which includes wireless devices, more robust monitoring systems were designed which were simple to use yet powerful enough to detect failures. As the wave of virtualization swept the technology world in early 2000’s, monitoring systems had to be evolved in order to monitor virtual machines. As cloud computing [19 and 20] came into existence over the past decade, monitoring systems had to be customized according to cloud technology. As world is looking towards IOTs, it becomes paramount to design monitoring systems which will be compatible with different kinds of devices and at the same time detect intrusions and failures efficiently. The term ‘Internet of things’ or IOTs [7, 8 and 9] refers to the networking amongst everyday objects or with a centralized system. More colloquially, it is the process of how various ‘things’ which are connected to the internet interact with each other. Ever since the idea of first internet based coke machine was conceived at Carnegie Mellon University in 1982, the idea about extending internet to entities turned into a reality. This can be observed in the form of RFID [10, 11 and 12] technology which provides a unique identity to objects. Apart from this, iPad controlled lights has gained significant importance in organizations and homes. To add to this list, there has been a gradual progress in the research on smart cars and smart homes [13]. Furthermore, in order to make IOT a reality a lot of research has been going on in domain of security issues [1] pertaining to IOT and operating systems [2] which will be compatible with IOT. It’s important to have monitoring systems in place which would ensure that these devices are monitored periodically and intimates user accordingly. There are three primary reasons for designing monitoring systems: intrusion detections [14, 15, 21, 24, 25 and 26], notifications about critical parameters reaching threshold and alerts pertaining to failure of the corresponding machine. Therefore, it’s important that whatever monitoring systems are deployed onto the architecture they must analyze all three parameters named above and must notify user accordingly. Moreover, if the monitoring system can identify whether encrypted [22, 23 and 24] connection exists between two nodes then it’ll be of added advantage to the network as a whole. In this paper, we will discuss two monitoring agents (Big Brother and Zenoss) and how they can be utilized in monitoring IOTs. 2. MONITORING SYSTEMS FOR IOTS Over the past decade, a number of monitoring systems were designed for effective network administration. Monitoring data will be present in almost all the nodes in the network but an efficient system will be able to collect all this data and present it to administrator in a comprehensive manner. Some of the monitoring systems which could meet this criterion are: Nagios, Big Brother, Ntop, Zenoss and Multi Router Traffic Grapher (MRTG). Big Brother, Zenoss and Nagios are mostly used as part of enterprise level monitoring solution since they could monitor all aspects of the network. On the other hand, the functionality of Ntop and MRTG are somewhat limited since they were primarily designed to monitor IP traffic. Our prime focus henceforth will be on Big Brother and Zenoss and how they could be deployed in IOTs. 2.1 USING BIG BROTHER (BB) IN IOT Big Brother (also called BB) is the first monitoring system to use web as its user interface. This allowed non-technical users to see the holistic picture and gain an understanding of network in a simplified manner. BB uses a client-server model where client will send status information to monitoring server after certain time intervals. BB can be effective tool to monitor IOTs. Consider the example of smart home. Consider an example of smart home which will have smart refrigerator, smart washing machine and
  • 2. Int. J. Advanced Networking and Applications Volume: 07 Issue: 01 Pages: 2622-2625 (2015) ISSN: 0975-0290 2623 smart AC. Let's consider the definitions of each entity described. Smart refrigerator will adjust its temperature automatically based on the weather so that electricity consumption can be optimized. Smart washing machine will automatically set its washing mode based on the cloth material and finally smart AC will again be able to adjust its temperature according to climate outdoors. Each of these smart devices will operate on sensors or actuators or both. Hence it is important to maintain a server and a UI, which will present required information to user on his/her mobile/tablet. Also a tabular form can be maintained as shown in table 1 where for sensors/actuators ‘working’ condition is highlighted in green while ‘not working’ condition is highlighted in red. For memory/cpu-utilization three colors are used to indicate the value above or below threshold. This table is just an excerpt of a larger table which will have many more smart things and corresponding parameters to be analyzed. 2.2 USING ZENOSS IN IOT Zenoss is an open source platform based on SNMP [16 and 17] protocol and it monitors networks, servers, applications and services. The biggest advantage of this monitoring system is that it is an open architecture and hence users can customize it according to their own needs. As a result, it is widely used in enterprise solutions. The functionality of this monitoring system can be extended to IOTs as well. Given that SNMP is the underlying protocol, the notification mechanism can be either polling or traps. Polling would be a better option for most IOT based devices since metrics can be stored and as a result historical analysis can be performed. Also configuring notifications and alarms based on active polling is much easier as compared to traps. Consider again the example of smart home described previously: network server can easily identify via polling the status of smart things. Metrics will be presented to user in the form of UI and it will also include data in graphical form. 3. COMPARISON BETWEEN ZENOSS & BB IN IOT Both BB and Zenoss have been extensively used by enterprises in the past. Given their wide range of functionality and ease of deployment they still continue to be a part of most organizations monitoring framework. As a result of their ability to provide comprehensive overview of the network, both can be deployed for monitoring IOT enabled devices. Both can work in heterogeneous environment where apart from virtual or physical machines other network devices like routers, switches can also be monitored. But after due consideration of the features being offered by these two monitoring agents, Zenoss is found to be slightly better than BB due to multiple reasons. Zenoss is found to support IPv6 protocol which is bound to gain paramount importance in case of IOTs due to range of IP addresses being offered by it. As mentioned previously, there will be an exponential increase in the number of IOT enabled devices in the near future and as a result identifying each device uniquely will be of prime importance. Therefore, it’s essential to have a protocol in place which will ensure that numbers of unique tags are not depleted while identifying IOT devices. IPv6 serves this purpose quite well. With Zenoss being compatible with IPv6, its execution in IOT will be less complex. Secondly, in Zenoss there is provision for both: polling as well as trap, both of which will be significant as far as IOT is concerned. Let us consider an example: if a smart car is being monitored then it is important to gain a periodic update as to whether it is working properly or not. Thus, implementing polling becomes inevitable. On the other hand if something needs to be communicated on an urgent basis like calling a fire brigade by a smart device then implementing trap is the only feasible option. With SNMP offering both these features and given that Zenoss is based on SNMP, it can safely be assumed to be ideal for IOT. Finally, it'll easier to manage IOT devices using Zenoss due to the fact that an MIB [18] file can be created for each managed object. MIB (management information base) file is a formal description of a set of network objects that can be managed using the SNMP. A sample MIB file for smart home described above has been mentioned below: SMART_HOME-MIB DEFINITIONS: = BEGIN IMPORTS enterprises FROM RFC1155-SMI OBJECT-TYPE FROM RFC-1212 DisplayString FROM RFC-1213; smartAC OBJECT-TYPE SYNTAX DisplayString ACCESS read-only STATUS mandatory DESCRIPTION "The description of the smart AC" smartRefrigerator OBJECT-TYPE SYNTAX DisplayString ACCESS read-only STATUS mandatory DESCRIPTION "The description of the smart refrigerator" smartWashingMachine OBJECT-TYPE SYNTAX DisplayString ACCESS read-only STATUS mandatory DESCRIPTION "The description of the smart washing machine"
  • 3. Int. J. Advanced Networking and Applications Volume: 07 Issue: 01 Pages: 2622-2625 (2015) ISSN: 0975-0290 2624 Table 1 T a b l e 1 4. CONCLUSION While Internet of things (IOT) is yet to mark its arrival in a substantial way in technology world, it becomes paramount to address monitoring perspective beforehand. Some of them were highlighted in this paper and a brief attempt was to enable the reader to understand the context in which two of the existing monitoring solutions can be deployed for IOT enabled devices. Although only two monitoring systems were presented in this paper which could be deployed in IOT, there is no denial that other monitoring systems in the market can also be implemented as part of IOT enabled devices. But there is no denying the fact that Big Brother and Zenoss can monitor wide range of applications which includes processes, events and even logs. A comparison was presented between these two monitoring systems and then an inference was drawn based on certain observations about which would be better in case of IOT. ACKNOWLEDGEMENTS The author is extremely grateful to Dr. Sugata Sanyal for his invaluable suggestions which led to the improvement of this paper. REFERENCES [1] Tuhin Borgohain, Amardeep Borgohain, Uday Kumar, Sugata Sanyal, “Authentication Systems in Internet of Things”, arXiv preprint arXiv:1502.00870, 2015/2/3 [2] Tuhin Borgohain, Uday Kumar, Sugata Sanyal, “Survey of Operating Systems for the IoT Environment”, arXiv preprint arXiv:1504.02517, 2015/4/13 [3] Andreas Hanemann, Jeff W. Boote, Eric L. Boyd, Jérôme Durand, Loukik Kudarimoti, Roman Łapacz, D. Martin Swany, Szymon Trocha, Jason Zurawski, “PerfSONAR: A Service Oriented Architecture for Multi-domain Network Monitoring”, pp 241-254, DOI 10.1007/11596141_19, Volume 3826, 2005 [4] Chuck Cranor, Yuan Gao, Theodore Johnson, Vlaidslav Shkapenyuk, Oliver Spatscheck, “Gigascope: high performance network monitoring with an SQL interface”, pages 623, DOI 10.1145/564691.564777, ACM, 2002-06-03 [5] Ferdinand Engel, Kendall S. Jones, Kary Robertson, David M. Thompson, Gerard White, "Network Monitoring", US Patent US6115393 A, Sep 5, 2000 [6] Marcus J Ranum,Kent Landfield, Mike Stolarchuk, Mark Sienkiewicz, Andrew Lambeth, Eric Wall, "Implementing a generalized tool for network monitoring", Information Security Technical Report, Elsevier, 1998 [7] Feng Xia, Laurence T.Yang, Lizhe Wang and Alexey Vinel, “Internet of Things”, INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, Volume 25, Issue 9, pages 1101-1102, September 2012 [8] Kevin Ashton, “That ‘Internet of Things’ Thing”, RFID journal, June 2009, http://www.rfidjournal.com/articles/view?4986 [9] Kortuem G, Kawsar F Fitton D, Sundramoorthy V, “Smart objects as building blocks for internet of things”, Internet Computing IEEE, Volume 14, Issue 1, Pages 44-51, Feb 2010 [10] A Juels, "RFID security and privacy: A research survey", Selected Areas in Communications, IEEE Journal on Volume: 24, Issue: 2, Pages 381 – 394, Feb 2006 [11] R Want, "An introduction to RFID technology", Pervasive Computing, IEEE Volume:5, Issue: 1, Pages 25-33, Jan-March 2006 [12] Battle L, Cole G, Gould K, Rector K, Raymer S, Balazinska M, Borriello G, “Building the Internet of Things Using RFID: The RFID Ecosystem Experience”, Pages 48-55, Volume 13, Issue 3, Internet Computing IEEE, May-June 2009 [13] D. Bregman, "Smart Home Intelligence – The eHome that Learns", International Journal of Smart Home, Volume 4, No. 4, October 2010 [14] Animesh K Trivedi, Rajan Arora, Rishi Kapoor, Sudip Sanyal and Sugata Sanyal, "A Semi-distributed Reputation-based Intrusion Detection System for Mobile Ad hoc Networks”, arXiv preprint arXiv:1006.1956, 2010/6/10 [15] Manoj Rameshchandra Thakur, Sugata Sanyal, "A Multi-Dimensional approach towards Intrusion Detection System", arXiv:1205.2340v1[cs.CR], 2012/5/10 [16] J.D. Case, M. Fedor, M.L. Schoffstall, J. Davin, "Simple Network Management Protocol (SNMP)", http://dx.doi.org/10.17487/RFC1157, May 1990 Sensor Actuator Memory CPU utilization Smart AC Working Working Below threshold Below Threshold Smart Refrigerator Not working Working Threshold Below Threshold Smart washing machine Working Not working Above Threshold Above Threshold
  • 4. Int. J. Advanced Networking and Applications Volume: 07 Issue: 01 Pages: 2622-2625 (2015) ISSN: 0975-0290 2625 [17] William Stallings, "SNMP, SNMPv2, and CMIP: the practical guide to network management", Book, ISBN:0-201-63331-0, 1993 [18] David Perkins, Evan McGinnis, "Understanding SNMP MIBs", Book, ISBN:0-13-437708-7, 1997 [19] Michael Armbrust, Armando Fox, Rean Griffith, Anthony D. Joseph, Randy Katz, Andy Konwinski, Gunho Lee, David Patterson, Ariel Rabkin, Ion Stoica, Matei Zaharia, “A view of cloud computing”, Communications of the ACM, Volume 53 Issue 4, Pages 50-58, April 2010 [20] Simon Ostermann, Alexandria Iosup, Nezih Yigitbasi, Radu Prodan, Thomas Fahringer, Dick Epema, "A Performance Analysis of EC2 Cloud Computing Services for Scientific Computing", pp 115-131, DOI 10.1007/978-3-642-12636-9_9, 2010 [21] Ajith Abraham, Ravi Jain, Sugata Sanyal, Sang Yong Han, "SCIDS: a soft computing intrusion detection system", Pages 252-257, Book Distributed Computing-IWDC 2004, 2005/1/1 [22] Dan Boneh, Matt Franklin, "Identity-Based Encryption from the Weil Pairing", Advances in Cryptology — CRYPTO 2001, pp 213-229, DOI 10.1007/3-540-44647-8_13, 2001 [23] Ronald L. Rivest, "The RC5 encryption algorithm", Second International Workshop Leuven, Belgium, pp 86-96, DOI 10.1007/3-540-60590-8_7, December 14–16, 1994 [24] Brent Waters, "Efficient Identity-Based Encryption Without Random Oracles", 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, pp 114-127, May 22-26, 2005 [25] Animesh Kr. Trivedi, Rishi Kapoor, Rajan Arora, Sudip Sanyal, Sugata Sanyal, "RISM - Reputation Based Intrusion Detection System for Mobile Ad hoc Networks", Third International Conference on Computers and Devices for Communications CODEC-06, pages 234-237, 2006 [26] Divyata Dal, Siby Abraham, Ajith Abraham, Sugata Sanyal, Mukund Sanglikar, "Evolution induced secondary immunity: An artificial immune system based intrusion detection system", Computer Information Systems and Industrial Management Applications, Pages 65-70, IEEE, 2008