1,503 results on '"Machine to machine"'
Search Results
2. Integration of MQTT-SN and CoAP protocol for enhanced data communications and resource management in WSNs.
- Author
-
Nwankwo, Emmanuel, David, Michael, and Onwuka, Elizabeth Nonye
- Subjects
DATA transmission systems ,COMMUNICATION in management ,WIRELESS sensor networks ,SENSOR networks ,RESOURCE management ,CONFLICT of interests - Abstract
Lightweight communication protocols for wireless sensor networks (WSNs) are unfolding for machine to machine (M2M) communications and thus there is always going to be a possible conflict of interest on which protocol is best suited for any particular application. The two protocols of interest in this study are the message queue telemetry transport protocol for sensor network (MQTT-SN), a variant of message queue telemetry transport (MQTT) protocol and the constrained application protocol (CoAP). There have been studies that reveal that these protocols perform differently based on the underlying network conditions. CoAP experience lower delays than MQTT for higher packet loss and higher delays for lower packet loss. MQTT default communication via a broker is easier to scale compared to CoAP direct request-response paradigm. Although this is a huge advantage over CoAP, it presents the single point-of-failure problem. In this paper we propose an integration of MQTT-CoAP protocol using an abstraction layer that enables both MQTT-SN and CoAP protocol to be used in the same sensor node. Resources are managed by directly modifying sensor node configuration using CoAP protocol. Performance evaluation of these protocols under the integrated scenario shows acceptable levels of latency and energy consumption for internet of thing (IoT) operations. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
3. Energy-Efficient Deep Neural Networks for EEG Signal Noise Reduction in Next-Generation Green Wireless Networks and Industrial IoT Applications.
- Author
-
Kumar, Arun, Chakravarthy, Sumit, and Nanthaamornphong, Aziz
- Subjects
- *
DEEP learning , *ARTIFICIAL neural networks , *NOISE control , *ELECTROENCEPHALOGRAPHY , *FREQUENCY shift keying , *INDUSTRIALISM - Abstract
Wireless electroencephalography (EEG) has emerged as a critical interface between human cognitive processes and machine learning technologies in the burgeoning field of sensor communications. This paper presents a comprehensive review of advancements in wireless EEG communication and analysis, with an emphasis on their role in next-generation green wireless networks and industrial IoT. The review explores the efficacy of modulation techniques, such as amplitude-shift keying (ASK) and frequency-shift keying (FSK) in EEG data transmission, and emphasizes the transformative role of deep learning in the joint transmission and restoration of EEG signals. In addition, we propose a novel, energy-efficient approach to deep learning-based EEG analytics, designed to enhance wireless information transfer for industrial IoT applications. By applying an autoencoder to sample the EEG data and incorporating a hidden layer to simulate a noisy communication channel, we assessed the energy efficiency and reliability of the transmission. Our results demonstrate that the chosen network topology and parameters significantly affect not only data fidelity but also energy consumption, thus providing valuable insights for the development of sustainable and efficient wireless EEG systems in industrial IoT environments. A key aspect of our study is related to symmetry. Our results demonstrate that the chosen network topology and parameters significantly impact not only data fidelity but also energy fidelity and energy consumption, thus providing valuable insights for the development of sustainable and efficient wireless EEG systems in industrial IoT environments. Furthermore, we realized that the EEG data showed mildly marked symmetry. Neural networks must also exhibit asymmetric behavior for better performance. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
4. Radio wave propagation analysis with dominant path model using MIMO antenna element for vehicular base station application.
- Author
-
Roja, Vadlamudi and D., Sriram Kumar
- Subjects
RADIO wave propagation ,ANTENNAS (Electronics) ,PATH analysis (Statistics) ,WAVE analysis ,QUADRATURE amplitude modulation ,THEORY of wave motion ,SUBSTRATE integrated waveguides - Abstract
A low-profile slant ±45° polarized antenna for a 4G/5G base station with a dominant path wave propagation model (DPM) is reported in this paper. For dual-polarization and wide impedance bandwidth, the two dipole radiators are crisscrossed and a square metallic ring is integrated with the dipole arms and screwed with the four shorting vias. The antenna operates in Band 40/41/42/43 with strong isolation and low ECC (Envelop Correlation Coefficient). Fabricated antenna results show that the predicted wideband antenna has 13.38% bandwidth in 4G, which is Band 40/41, and 29.33% bandwidth in 5G sub-6 GHz Band 42/43. The antenna has a consistent radiation pattern, a 40 dB XPD (Cross Pol Discrimination), and a beam width of 69.5° ±1.5° in the entire frequency band. Three base station sites were explored to deploy the radiation pattern of a dual-polarized antenna in the 3D EM (Electromagnetic Analysis) tool. To evaluate signal quality, strength, radio network planning, and wave propagation analysis by analyzing antenna performance in real-time scenarios with 64 and 256 QAM (Quadrature Amplitude Modulation) techniques. For the proposed four-stream MIMO (Multiple-Input-Multiple-Output) antenna arrangement at deployed cell sites for 4G/5G base station applications, the maximum downlink and uplink data rates are 3.826/2.8 Mbps and 1044/800 Mbps respectively. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
5. IoTScal-SC2: Two Cloud Computing Systems-Based Collaboration Solution for Scalability Issue in IoT Networks
- Author
-
Zyane, Abdellah, Bahiri, Mohamed Nabil, Ghammaz, Abdelilah, Angrisani, Leopoldo, Series Editor, Arteaga, Marco, Series Editor, Panigrahi, Bijaya Ketan, Series Editor, Chakraborty, Samarjit, Series Editor, Chen, Jiming, Series Editor, Chen, Shanben, Series Editor, Chen, Tan Kay, Series Editor, Dillmann, Rüdiger, Series Editor, Duan, Haibin, Series Editor, Ferrari, Gianluigi, Series Editor, Ferre, Manuel, Series Editor, Hirche, Sandra, Series Editor, Jabbari, Faryar, Series Editor, Jia, Limin, Series Editor, Kacprzyk, Janusz, Series Editor, Khamis, Alaa, Series Editor, Kroeger, Torsten, Series Editor, Li, Yong, Series Editor, Liang, Qilian, Series Editor, Martín, Ferran, Series Editor, Ming, Tan Cher, Series Editor, Minker, Wolfgang, Series Editor, Misra, Pradeep, Series Editor, Möller, Sebastian, Series Editor, Mukhopadhyay, Subhas, Series Editor, Ning, Cun-Zheng, Series Editor, Nishida, Toyoaki, Series Editor, Oneto, Luca, Series Editor, Pascucci, Federica, Series Editor, Qin, Yong, Series Editor, Seng, Gan Woon, Series Editor, Speidel, Joachim, Series Editor, Veiga, Germano, Series Editor, Wu, Haitao, Series Editor, Zamboni, Walter, Series Editor, Zhang, Junjie James, Series Editor, Bekkay, Hajji, editor, Mellit, Adel, editor, Gagliano, Antonio, editor, Rabhi, Abdelhamid, editor, and Amine Koulali, Mohammed, editor
- Published
- 2023
- Full Text
- View/download PDF
6. Internet of Things and Cyber-Physical Systems
- Subjects
internet of things ,cyber-physical systems ,machine to machine ,big data ,artificial intelligence ,digital twins ,Electronic computers. Computer science ,QA75.5-76.95 - Published
- 2023
7. The Effect of Pilot Reuse Factor on Massive MIMO Spectral Efficiency.
- Author
-
Albadran, Saleh M.
- Subjects
MIMO systems ,ANTENNA arrays ,ANTENNAS (Electronics) ,CHANNEL estimation ,SPATIAL resolution - Abstract
Due to their much increased spatial resolution and array gain, large-scale antenna arrays have the potential to significantly enhance the spectral efficiency of wireless systems. Recent research in the area of massive Multiple-Input Multiple-Output (MIMO) antennas shows that user channels are enhanced as the number of antennas at the Base Stations (BSs) rises, allowing achieving high signal improvement with minimum inter-user interference. The combined effects of the pilot reuse factor and the BS number of antennas on average overall spectral efficiency in huge MIMO antennas will be investigated. To examine the SE of these receivers, several channel estimators will be utilized, including LMMSE, ZF, and MR methods. Theoretically, BS could offer a substantially higher average total SE if it had more antennas. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
8. Home Automation Using Internet of Things: An Extensive Review
- Author
-
Yadav, Ruchi, Yadav, Nitin, Gupta, Kartik, Priyadarshini, Rashmi, Chakraborty, Sudeshna, Kumar, Pramod, Kacprzyk, Janusz, Series Editor, Gomide, Fernando, Advisory Editor, Kaynak, Okyay, Advisory Editor, Liu, Derong, Advisory Editor, Pedrycz, Witold, Advisory Editor, Polycarpou, Marios M., Advisory Editor, Rudas, Imre J., Advisory Editor, Wang, Jun, Advisory Editor, Rawat, Sanyog, editor, Kumar, Arvind, editor, Kumar, Pramod, editor, and Anguera, Jaume, editor
- Published
- 2022
- Full Text
- View/download PDF
9. PDR Indoor Positioning Method Based on M2M Encounter Region
- Author
-
TANG Qing-hua, WANG Mei, TANG Chao-chen, LIU Xin, LIANG Wen
- Subjects
pedestrian dead reckoning ,indoor positioning ,machine to machine ,trilateral positioning ,particle filtering ,Computer software ,QA76.75-76.765 ,Technology (General) ,T1-995 - Abstract
In indoor positioning,the main advantage of pedestrian dead reckoning(PDR)is that the user only needs to have a smart phone to realize positioning,without relying on the external environment.However,there is a large cumulative error.Ge-nerally,it is necessary to combine Bluetooth,WiFi,geomagnetic or other technologies to improve the positioning accuracy.How-ever, this method requires some hardware nodes and a fingerprint database to be built for this purpose.To solve this problem,an indoor positioning method based on correcting PDR in machine to machine(M2M)area is proposed.Firstly,a distance measurement area is set up during pedestrian travel.Secondly,the distance between pedestrian mobile phones and other mobile phones is measured in this region.Finally,the positioning error and accuracy of PDR are corrected by trilateral positioning method.The method has the advantages that no additional hardware facilities are required.Experimental results show that,compared with the traditional PDR positioning,this method is suitable for long-time positioning,and the average positioning error is reduced to 0.36 m,with high positioning accuracy.
- Published
- 2022
- Full Text
- View/download PDF
10. Towards green Internet of Things (IoT) for a sustainable future in Gulf Cooperation Council countries: current practices, challenges and future prospective.
- Author
-
Albreem, Mahmoud A., Sheikh, Abdul Manan, Bashir, Mohammed J. K., and El-Saleh, Ayman A.
- Subjects
- *
MACHINE-to-machine communications , *DISTRIBUTED artificial intelligence , *INTERNET of things , *SUSTAINABILITY , *SMART cities , *DISTRIBUTED computing - Abstract
The proliferation of devices connected via the Internet of Things (IoT) leads to high energy consumption, e-waste production, and ultimately, additional extra carbon emissions. To maximize the benefits and reduce the detrimental impact of IoT on the environment, the concept of green IoT (GIoT) is presented, which can fulfill the need for a smart and sustainable world. This study aims to investigate the current practices, challenges, and policies related to the implementation of GIoT in Gulf Cooperation Council (GCC) countries (Saudi Arabia, United Arab Emirates (UAE), Qatar, Kuwait, Oman, and Bahrain). GCC countries are placed in the top 14 per capita carbon dioxide (CO 2 ) emissions in the world. This study pioneers discussing the GIoT through the GCC perspective. Therefore, this study reviews the threat of e-waste to the environment and counteract strategies of GCC nations. The impact of living standards in GCC countries on embodied energy and obsolescence overheads were highlighted. This study provides insights into economic diversification plans laid out by GCC countries in their national vision and moving away from dependence on hydrocarbon reserves. The renewable energy (RE) opportunities available in the context of smart city development and GIoT deployment were evaluated. Power consumptions of computing servers at data centers, sensor nodes, and machine-to-machine (M2M) communications were discussed. Integration of artificial intelligence in distributed computing environments was also studied. GCC countries lag in the network readiness index but rank higher on information and communications technology usage (ICT), individual skills, and access to ICT. GCC countries are also making steady progress in building the best international practices and in leveraging opportunities to transform digital government models. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
11. Energy-Efficient Deep Neural Networks for EEG Signal Noise Reduction in Next-Generation Green Wireless Networks and Industrial IoT Applications
- Author
-
Arun Kumar, Sumit Chakravarthy, and Aziz Nanthaamornphong
- Subjects
EEG ,deep learning ,WBAN ,machine to machine ,wireless sensor networks ,Mathematics ,QA1-939 - Abstract
Wireless electroencephalography (EEG) has emerged as a critical interface between human cognitive processes and machine learning technologies in the burgeoning field of sensor communications. This paper presents a comprehensive review of advancements in wireless EEG communication and analysis, with an emphasis on their role in next-generation green wireless networks and industrial IoT. The review explores the efficacy of modulation techniques, such as amplitude-shift keying (ASK) and frequency-shift keying (FSK) in EEG data transmission, and emphasizes the transformative role of deep learning in the joint transmission and restoration of EEG signals. In addition, we propose a novel, energy-efficient approach to deep learning-based EEG analytics, designed to enhance wireless information transfer for industrial IoT applications. By applying an autoencoder to sample the EEG data and incorporating a hidden layer to simulate a noisy communication channel, we assessed the energy efficiency and reliability of the transmission. Our results demonstrate that the chosen network topology and parameters significantly affect not only data fidelity but also energy consumption, thus providing valuable insights for the development of sustainable and efficient wireless EEG systems in industrial IoT environments. A key aspect of our study is related to symmetry. Our results demonstrate that the chosen network topology and parameters significantly impact not only data fidelity but also energy fidelity and energy consumption, thus providing valuable insights for the development of sustainable and efficient wireless EEG systems in industrial IoT environments. Furthermore, we realized that the EEG data showed mildly marked symmetry. Neural networks must also exhibit asymmetric behavior for better performance.
- Published
- 2023
- Full Text
- View/download PDF
12. Improving Health WSN with Distinguished Cloud Computing for Multi-Sensor Analytics.
- Author
-
Baig, Mirza Moiz and Sonekar, Srikant V.
- Subjects
WIRELESS sensor networks ,TELECOMMUNICATION systems ,INFRASTRUCTURE (Economics) ,SENSOR networks ,REDUNDANCY in engineering ,INTERNET of things - Abstract
In the twenty-first century, automation has become more prevalent in large part due to the Internet of Things (IoT). The integration of IoT, Wireless Sensor Networks (WSNs) and health monitoring system with multi-cloud environment can optimize a lot of parameters like bandwidth, communication protocols and redundancy of the sensor network. The proposed architecture is introduced keeping in mind the current health infrastructure and monitoring system with different types of network framework. We have also discussed about machine to machine protocols for health monitoring with common entities linked with building communication protocols. The sensors data analytics carried out can sustain multi-level computation is the idea behind this research prospect to give greater depth about direct applicability in multi cloud sensor communication protocols. The offered prototype, when modelled with the unique communication system, produces a more efficient model than the standard way, with a system that is 98 percent more accurate. [ABSTRACT FROM AUTHOR]
- Published
- 2022
13. IoTScal-C: A Based Cloud Computing Collaboration Solution for Scalability Issue in IoT Networks
- Author
-
Bahiri, Mohamed Nabil, Zyane, Abdellah, Ghammaz, Abdelilah, Angrisani, Leopoldo, Series Editor, Arteaga, Marco, Series Editor, Panigrahi, Bijaya Ketan, Series Editor, Chakraborty, Samarjit, Series Editor, Chen, Jiming, Series Editor, Chen, Shanben, Series Editor, Chen, Tan Kay, Series Editor, Dillmann, Rüdiger, Series Editor, Duan, Haibin, Series Editor, Ferrari, Gianluigi, Series Editor, Ferre, Manuel, Series Editor, Hirche, Sandra, Series Editor, Jabbari, Faryar, Series Editor, Jia, Limin, Series Editor, Kacprzyk, Janusz, Series Editor, Khamis, Alaa, Series Editor, Kroeger, Torsten, Series Editor, Liang, Qilian, Series Editor, Martín, Ferran, Series Editor, Ming, Tan Cher, Series Editor, Minker, Wolfgang, Series Editor, Misra, Pradeep, Series Editor, Möller, Sebastian, Series Editor, Mukhopadhyay, Subhas, Series Editor, Ning, Cun-Zheng, Series Editor, Nishida, Toyoaki, Series Editor, Pascucci, Federica, Series Editor, Qin, Yong, Series Editor, Seng, Gan Woon, Series Editor, Speidel, Joachim, Series Editor, Veiga, Germano, Series Editor, Wu, Haitao, Series Editor, Zhang, Junjie James, Series Editor, Hajji, Bekkay, editor, Mellit, Adel, editor, Marco Tina, Giuseppe, editor, Rabhi, Abdelhamid, editor, Launay, Jerome, editor, and Naimi, Salah Eddine, editor
- Published
- 2021
- Full Text
- View/download PDF
14. Smarter Pills: Low-Cost Embedded Device to Elders
- Author
-
Romo, José Elías, Gutiérrez, Sebastián, Rodrigo, Pedro Manuel, Cardona, Manuel, Solanki, Vijender Kumar, Kacprzyk, Janusz, Series Editor, Pal, Nikhil R., Advisory Editor, Bello Perez, Rafael, Advisory Editor, Corchado, Emilio S., Advisory Editor, Hagras, Hani, Advisory Editor, Kóczy, László T., Advisory Editor, Kreinovich, Vladik, Advisory Editor, Lin, Chin-Teng, Advisory Editor, Lu, Jie, Advisory Editor, Melin, Patricia, Advisory Editor, Nedjah, Nadia, Advisory Editor, Nguyen, Ngoc Thanh, Advisory Editor, Wang, Jun, Advisory Editor, Kumar, Raghvendra, editor, Quang, Nguyen Ho, editor, Kumar Solanki, Vijender, editor, Cardona, Manuel, editor, and Pattnaik, Prasant Kumar, editor
- Published
- 2021
- Full Text
- View/download PDF
15. Environmental Energy Harvesting Techniques to Power Standalone IoT-Equipped Sensor and Its Application in 5G Communication
- Author
-
Satyanand Singh
- Subjects
energy harvesting ,iot ,smart city ,wsns ,machine to machine ,piezoelectric ,photovoltaic ,solar energy ,thermal energy. ,Technology (General) ,T1-995 ,Social sciences (General) ,H1-99 - Abstract
In the recent few years, due to its significant deployment to meet global demand for smart cities, the Internet of Things (IoT) has gained a lot of attention. Environment energy harvesting devices, which use ambient energy to generate electricity, could be a viable option in near future for charging or powering stand-alone IoT sensors and electronic devices. The key advantages of such energy harvesting gadgets are that they are environmentally friendly, portable, wireless, cost-effective, and compact. It is significant to propos and fabricate an improved, high-quality, economical, and efficient energy harvesting systems to overcome power supply to tiny IoT devices at the remote locations. In this article, various types of mechanisms for harvesting renewable energies that can power sensor enabled IoT locally, as well as its associated wireless sensor networks (WSNs), are reviewed. These methods are discussed in terms of their advantages and applications, as well as their drawbacks and limitations. Furthermore, methodological performance analysis for the decade 2005 to 2020 is surveyed in order to identify the methods that delivered high output power for each device. Furthermore, the outstanding breakthrough performances of each of the aforementioned micro-power generators during this time period are emphasized. According to the research, thermoelectric modules can convert up to 2500×10^(-3) W/cm^2, thermo-photovoltaic 10.9%, piezoelectric 10,000 mW/cm^3 and microbial fuel cell 6.86 W/m^2 of energy. Doi: 10.28991/esj-2021-SP1-08 Full Text: PDF
- Published
- 2021
- Full Text
- View/download PDF
16. Reliable Machine to Machine Communication Using MQTT Protocol and Mean Stack
- Author
-
Chandeliya, Nalin, Chari, Prashanth, Karpe, Sameeran, Karia, Deepak C., Xhafa, Fatos, Series Editor, Raj, Jennifer S., editor, Bashar, Abul, editor, and Ramson, S. R. Jino, editor
- Published
- 2020
- Full Text
- View/download PDF
17. The Evolving 5G Landscape
- Author
-
Quinn, Liam and McClellan, Stan, editor
- Published
- 2020
- Full Text
- View/download PDF
18. Priority‐based learning automata in Q‐learning random access scheme for cellular M2M communications
- Author
-
Nasir A. Shinkafi, Lawal M. Bello, Dahiru S. Shu'aibu, and Paul D. Mitchell
- Subjects
learning automata ,lte network ,machine to machine ,q‐learning ,rach congestion ,Telecommunication ,TK5101-6720 ,Electronics ,TK7800-8360 - Abstract
AbstractThis paper applies learning automata to improve the performance of a Q‐learning based random access channel (QL‐RACH) scheme in a cellular machine‐to‐machine (M2M) communication system. A prioritized learning automata QL‐RACH (PLA‐QL‐RACH) access scheme is proposed. The scheme employs a prioritized learning automata technique to improve the throughput performance by minimizing the level of interaction and collision of M2M devices with human‐to‐human devices sharing the RACH of a cellular system. In addition, this scheme eliminates the excessive punishment suffered by the M2M devices by controlling the administration of a penalty. Simulation results show that the proposed PLA‐QL‐RACH scheme improves the RACH throughput by approximately 82% and reduces access delay by 79% with faster learning convergence when compared with QL‐RACH.
- Published
- 2021
- Full Text
- View/download PDF
19. Wireless Sensor Network Optimization for Multi-Sensor Analytics in Smart Healthcare System.
- Author
-
Bahadur, Dilip Kumar Jang and Lakshmanam, L.
- Subjects
WIRELESS sensor networks ,SENSOR networks ,INFRASTRUCTURE (Economics) ,INTERNET of things ,TWENTY-first century - Abstract
In the twenty-first century, the Internet of Things (IoT) has assisted in the mainstreaming of automation. By boosting bandwidth, communication protocols, and redundancy, the integration of IoT, WSNs, and health monitoring systems with a multi-cloud environment can improve sensor networks. The proposed design is compared to current health infrastructure and monitoring systems, as well as alternative network architectures. Machine-to-machine health monitoring methods have also been investigated, as well as how they relate to communication protocols. The objective of this study is to find out more about how sensor data analytics may be used to multi-cloud sensor communication protocols directly. When the supplied prototype and the one-of-a-kind communication mechanism are merged, a model is created that is 98 percent more accurate than traditional techniques. [ABSTRACT FROM AUTHOR]
- Published
- 2022
20. Prototyping of Automatic Watering System for Agriculture Over Thread Network
- Author
-
Nimura, Takahiro, Isomura, Shuhei, Naito, Katsuhiro, Howlett, Robert J., Series Editor, Jain, Lakhmi C., Series Editor, Chen, Yen-Wei, editor, and Zimmermann, Alfred, editor
- Published
- 2019
- Full Text
- View/download PDF
21. An Enhancement for the Autonomic Middleware-Level Scalability Management Within IoT System Using Cloud Computing
- Author
-
Bahiri, M. N., Zyane, A., Ghammaz, A., Angrisani, Leopoldo, Series Editor, Arteaga, Marco, Series Editor, Panigrahi, Bijaya Ketan, Series Editor, Chakraborty, Samarjit, Series Editor, Chen, Jiming, Series Editor, Chen, Shanben, Series Editor, Chen, Tan Kay, Series Editor, Dillmann, Rüdiger, Series Editor, Duan, Haibin, Series Editor, Ferrari, Gianluigi, Series Editor, Ferre, Manuel, Series Editor, Hirche, Sandra, Series Editor, Jabbari, Faryar, Series Editor, Jia, Limin, Series Editor, Kacprzyk, Janusz, Series Editor, Khamis, Alaa, Series Editor, Kroeger, Torsten, Series Editor, Li, Yong, Series Editor, Liang, Qilian, Series Editor, Martín, Ferran, Series Editor, Ming, Tan Cher, Series Editor, Minker, Wolfgang, Series Editor, Misra, Pradeep, Series Editor, Möller, Sebastian, Series Editor, Mukhopadhyay, Subhas, Series Editor, Ning, Cun-Zheng, Series Editor, Nishida, Toyoaki, Series Editor, Pascucci, Federica, Series Editor, Qin, Yong, Series Editor, Seng, Gan Woon, Series Editor, Speidel, Joachim, Series Editor, Veiga, Germano, Series Editor, Wu, Haitao, Series Editor, Zhang, Junjie James, Series Editor, Hajji, Bekkay, editor, Tina, Giuseppe Marco, editor, Ghoumid, Kamal, editor, Rabhi, Abdelhamid, editor, and Mellit, Adel, editor
- Published
- 2019
- Full Text
- View/download PDF
22. Big Data on Machine to Machine Integration’s Requirement Analysis Within Industry 4.0
- Author
-
Coda, Felipe A., Salles, Rafael M., Vitoi, Henrique A., Pessoa, Marcosiris A. O., Moscato, Lucas A., Santos Filho, Diolino J., Junqueira, Fabrício, Miyagi, Paulo E., Rannenberg, Kai, Editor-in-Chief, Sakarovitch, Jacques, Editorial Board Member, Goedicke, Michael, Editorial Board Member, Tatnall, Arthur, Editorial Board Member, Neuhold, Erich J., Editorial Board Member, Pras, Aiko, Editorial Board Member, Tröltzsch, Fredi, Editorial Board Member, Pries-Heje, Jan, Editorial Board Member, Kreps, David, Editorial Board Member, Reis, Ricardo, Editorial Board Member, Furnell, Steven, Editorial Board Member, Furbach, Ulrich, Editorial Board Member, Winckler, Marco, Editorial Board Member, Malaka, Rainer, Editorial Board Member, Camarinha-Matos, Luis M., editor, Almeida, Ricardo, editor, and Oliveira, José, editor
- Published
- 2019
- Full Text
- View/download PDF
23. Analysis of Mobile Environment for Ensuring Cyber-Security in IoT-Based Digital Forensics
- Author
-
Maria Jones, G., Godfrey Winster, S., Santhosh Kumar, S. V. N., Kacprzyk, Janusz, Series Editor, Pal, Nikhil R., Advisory Editor, Bello Perez, Rafael, Advisory Editor, Corchado, Emilio S., Advisory Editor, Hagras, Hani, Advisory Editor, Kóczy, László T., Advisory Editor, Kreinovich, Vladik, Advisory Editor, Lin, Chin-Teng, Advisory Editor, Lu, Jie, Advisory Editor, Melin, Patricia, Advisory Editor, Nedjah, Nadia, Advisory Editor, Nguyen, Ngoc Thanh, Advisory Editor, Wang, Jun, Advisory Editor, Wang, Jiacun, editor, Reddy, G. Ram Mohana, editor, Prasad, V. Kamakshi, editor, and Reddy, V. Sivakumar, editor
- Published
- 2019
- Full Text
- View/download PDF
24. Priority‐based learning automata in Q‐learning random access scheme for cellular M2M communications.
- Author
-
Shinkafi, Nasir A., Bello, Lawal M., Shu'aibu, Dahiru S., and Mitchell, Paul D.
- Subjects
MACHINE-to-machine communications ,TELECOMMUNICATION systems ,LEARNING - Abstract
This paper applies learning automata to improve the performance of a Q‐learning based random access channel (QL‐RACH) scheme in a cellular machine‐to‐machine (M2M) communication system. A prioritized learning automata QL‐RACH (PLA‐QL‐RACH) access scheme is proposed. The scheme employs a prioritized learning automata technique to improve the throughput performance by minimizing the level of interaction and collision of M2M devices with human‐to‐human devices sharing the RACH of a cellular system. In addition, this scheme eliminates the excessive punishment suffered by the M2M devices by controlling the administration of a penalty. Simulation results show that the proposed PLA‐QL‐RACH scheme improves the RACH throughput by approximately 82% and reduces access delay by 79% with faster learning convergence when compared with QL‐RACH. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
25. Semantically Enriched Hypermedia APIs for Next Generation IoT
- Author
-
Mazayev, Andriy, Martins, Jaime A., Correia, Noélia, Akan, Ozgur, Series Editor, Bellavista, Paolo, Series Editor, Cao, Jiannong, Series Editor, Coulson, Geoffrey, Series Editor, Dressler, Falko, Series Editor, Ferrari, Domenico, Series Editor, Gerla, Mario, Series Editor, Kobayashi, Hisashi, Series Editor, Palazzo, Sergio, Series Editor, Sahni, Sartaj, Series Editor, Shen, Xuemin (Sherman), Series Editor, Stan, Mircea, Series Editor, Xiaohua, Jia, Series Editor, Zomaya, Albert Y., Series Editor, Fortino, Giancarlo, editor, Palau, Carlos E., editor, Guerrieri, Antonio, editor, Cuppens, Nora, editor, Cuppens, Frédéric, editor, Chaouchi, Hakima, editor, and Gabillon, Alban, editor
- Published
- 2018
- Full Text
- View/download PDF
26. A New Monitoring Approach with Cloud Computing for Autonomic Middleware-Level Scalability Management Within IoT Systems
- Author
-
Bahiri, Mohamed Nabil, Zyane, Abdellah, Ghammaz, Abdelilah, Chassot, Christophe, Kacprzyk, Janusz, Series editor, Pal, Nikhil R., Advisory editor, Bello Perez, Rafael, Advisory editor, Corchado, Emilio S., Advisory editor, Hagras, Hani, Advisory editor, Kóczy, László T., Advisory editor, Kreinovich, Vladik, Advisory editor, Lin, Chin-Teng, Advisory editor, Lu, Jie, Advisory editor, Melin, Patricia, Advisory editor, Nedjah, Nadia, Advisory editor, Nguyen, Ngoc Thanh, Advisory editor, Wang, Jun, Advisory editor, and Noreddine, Gherabi, editor
- Published
- 2018
- Full Text
- View/download PDF
27. An Optimized LTE-Based Technique for Drone Base Station Dynamic 3D Placement and Resource Allocation in Delay-Sensitive M2M Networks
- Author
-
Ahmed E. Fahim and Yasser Gadallah
- Subjects
Computer Networks and Communications ,Computer science ,business.industry ,media_common.quotation_subject ,Public relations ,Drone ,Machine to machine ,Base station ,Work (electrical) ,Coursework ,Gratitude ,Resource allocation (computer) ,Electrical and Electronic Engineering ,business ,Moral support ,Software ,media_common - Abstract
I would like to express my sincere thanks and gratitude to my thesis advisor, Dr. Yasser Gadallah, for his tremendous support in completing this research work. I remember every piece of advice in our meetings and discussions that always built a strong and solid foundation for the thesis in particular and for my research skills in general. It is also worth mentioning the endless support of my academic advisor and the master’s program director, Dr. Maki Habib, for his exerted efforts to facilitate and grant the financial assistance that was a broad base of support to complete my study in the RCSS program. In addition, I am so grateful for the time spent in his labs where I learned many practical and professional concepts and methods in teaching and conducting research through my work as a teaching and research assistant under his guidance and supervision. My special and sincere thank you also goes to my dear colleague, Heba Kadry, for her continued moral support and encouragement throughout the years of working on my thesis. I remember when we spent hours discussing the challenges of the thesis or even the complicated coursework and how these discussions ended with a significant push to stand and move forward towards achieving my academic potential. Finally and foremost, many thanks to the great deal of support and assistance that grant me the completion of this thesis work and my master’s degree.
- Published
- 2023
28. Sensor Coverage Problem in Sparse MANET Environments
- Author
-
Lim, JongBeom, Yu, HeonChang, Gil, JoonMin, Park, James J. (Jong Hyuk), editor, Pan, Yi, editor, Yi, Gangman, editor, and Loia, Vincenzo, editor
- Published
- 2017
- Full Text
- View/download PDF
29. Educational Resource Information Communication API (ERIC API): The Case of Moodle and Online Tests System Integration
- Author
-
Chen, Cheng-Li, Chang, Maiga, Chang, Hung-Yi, Huang, Ronghuai, Series editor, Kinshuk, Series editor, Jemni, Mohamed, Series editor, Chen, Nian-Shing, Series editor, Spector, J. Michael, Series editor, Popescu, Elvira, editor, Khribi, Mohamed Koutheair, editor, and Sampson, Demetrios G., editor
- Published
- 2017
- Full Text
- View/download PDF
30. Intracluster cooperative communication in smart home scenario through stable election protocol.
- Author
-
Immanuvel Arokia James, K. and Prabakaran, R.
- Subjects
SMART homes ,MULTICASTING (Computer networks) ,WIRELESS sensor networks ,INTELLIGENT sensors ,ELECTIONS ,ROUTING algorithms - Abstract
Summary: A wireless sensor network (WSN) can give a coordinated and minimal effort checking and control answer for such keen emotionally supportive systems. In this paper, we have discussed about the SEP in comparison with LEACH for smart home applications. Smart home scenario of an industry is taken into consideration in our research. The normal sink node is represented in the name of link node that connects the multiple sectors in the smart home scenario. In addition, it will act as a cluster head for the entire smart home setup. Moreover, the present research work proposes the plan of a low energy and high throughput and various levelled cluster‐based directing convention for smart home sensor organize application. Proposed protocol performs dynamic cluster head choice in light of various node qualities like node enduring energy, remoteness of the node from the link (sink), and average distance of the node from various neighbor nodes. Cluster head appropriation is even and brings about upgraded organization lifetime. Sensor nodes process the sense information utilizing nearby on‐board processors and exclude the repetitive information from transmission. In the final section, the energy level and the through put can be compared with the LEACH for getting a better understanding. The simulation results of the proposed technique clarify the energy consumed and the energy remaining in the stream. The energy will be measured in Joules. Moreover, the dead node will be tracked and intimated through our proposed work. The packet delivery and the delayed process of each and every node will be discussed in the proposed simulation result. The energy level remained will be calculated in Joules measurement. The SEP level will be more when compared with LEACH protocol. The energy level will be improved in case of SEP as 5, 10, 15, and 20 J/ ms. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
31. Automatic Key Update Mechanism for Lightweight M2M Communication and Enhancement of IoT Security: A Case Study of CoAP Using Libcoap Library
- Author
-
Wen-Chung Tsai, Tzu-Hsuan Tsai, Te-Jen Wang, and Mao-Lun Chiang
- Subjects
Internet of Things ,information security ,machine to machine ,constrained application protocol ,Chemical technology ,TP1-1185 - Abstract
The ecosystem for an Internet of Things (IoT) generally comprises endpoint clients, network devices, and cloud servers. Thus, data transfers within the network present multiple security concerns. The recent boom in IoT applications has accelerated the need for a network infrastructure that provides timely and safe information exchange services. A shortcoming of many existing networks is the use of static key authentication. To enable the use of automatic key update mechanisms in IoT devices and enhance security in lightweight machine-to-machine (M2M) communications, we propose a key update mechanism, namely, double OTP (D-OTP), which combines both one-time password (OTP) and one-time pad to achieve an IoT ecosystem with theoretically unbreakable security. The proposed D-OTP was implemented into the Constrained Application Protocol (CoAP) through the commonly used libcoap library. The experimental results revealed that an additional 8.93% latency overhead was required to obtain an unbreakable guarantee of data transfers in 100 CoAP communication sessions.
- Published
- 2022
- Full Text
- View/download PDF
32. Food Safety and Sustainability ‒ An Exploratory Approach at the Level of the Romanian Wine Production Companies
- Author
-
Gheorghe Epuran, Gabriel Brătucu, Oana Bărbulescu, Nicoleta Andreea Neacşu, and Anca Madar
- Subjects
sustainable development ,food safety ,European legislation ,wine quality ,wine industry ,marketing strategies ,education ,Machine to Machine ,Internet of Things ,Business ,HF5001-6182 ,Economics as a science ,HB71-74 - Abstract
This article aims at identifying and analyzing opinions referring to the necessity, opportunity and efficiency of the implementation of the strategies and sustainable development practices in the wine industry as food safety is considered a component of sustainability. The main objective of the paper is to create a clear picture of the existing willingness of companies to adopt marketing strategies that should contribute to increasing food security by increasing the quality of wine and which should be based on the principles of sustainability. In this sense, the authors conducted some qualitative marketing research in which 15 managers from wine producing companies from Romania's wine-growing areas were interviewed. The research highlights the relationship between responsible consumption, food safety and sustainability, and the authors believe that such an association is relevant to the economic and social context of the European Union and other parts of the world. The novelty of this research refers to the analysis of the relationship between the responsible wine consumption and sustainability, to the identification of the opinions of the wine companies managers regarding the benefits and the limits of M2M and IoT technologies, to the emphasis of the marketing strategies and techniques considered innovative in the field of viticulture, as well as to the association of the concept of food safety by wine consumption to the aspects related to education and culture.
- Published
- 2018
- Full Text
- View/download PDF
33. IEEE 802.11ah 网络能效优化的RAW 适配机制.
- Author
-
刘 叶, 李 云, 夏士超, and 陈其荣
- Subjects
ENERGY consumption ,TECHNICAL specifications - Abstract
Copyright of Journal of Chongqing University of Posts & Telecommunications (Natural Science Edition) is the property of Chongqing University of Posts & Telecommunications and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2020
- Full Text
- View/download PDF
34. A Multifunctional Public Lighting Infrastructure, Design and Experimental Test
- Author
-
Marco Beccali, Valerio Lo Brano, Marina Bonomolo, Paolo Cicero, Giacomo Corvisieri, Marco Caruso, and Francesco Gamberale
- Subjects
Multifunctional street lighting ,Information and communications technology integration ,Energy efficiency ,Machine to machine ,Lighting design ,Smart lighting. ,Technology ,Economic growth, development, planning ,HD72-88 - Abstract
Nowadays, the installation of efficient lighting sources and Information and Communications Technologies can provide economic benefits, energy efficiency, and visual comfort requirements. More advantages can be derived if the public lighting infrastructure integrates a smart grid. This study presents an experimental multifunctional infrastructure for public lighting, installed in Palermo. The system is able to provide smart lighting functions (hotspot Wi-Fi, video-surveillances, car and pedestrian access control, car parking monitoring and support for environmental monitoring). A remote control and monitoring platform called “Centro Servizi” processes the information coming from different installations as well as their status in real time, and sends commands to the devices (e.g. to control the luminous flux), each one provided with a machine to machine interface. Data can be reported either on the web or on a customised app. The study has shown the efficient operation of such new infrastructure and its capability to provide new functions and benefits to citizens, tourists, and public administration. Thus, this system represents a starting point for the implementation of many other lighting infrastructure features typical of a “smart city.”
- Published
- 2017
- Full Text
- View/download PDF
35. Smart Cities Simulation Environment for Intelligent Algorithms Evaluation
- Author
-
Chamoso, Pablo, De Paz, Juan F., Rodríguez, Sara, Bajo, Javier, Kacprzyk, Janusz, Series editor, Lindgren, Helena, editor, De Paz, Juan F., editor, Novais, Paulo, editor, Fernández-Caballero, Antonio, editor, Yoe, Hyun, editor, Jiménez Ramírez, Andres, editor, and Villarrubia, Gabriel, editor
- Published
- 2016
- Full Text
- View/download PDF
36. On internet of things education
- Author
-
Dmitry Namiot, Manfred Sneps-Sneppe, and Yousef Ibrahim Daradkeh
- Subjects
Internet of Things ,education ,Machine to Machine ,Telecommunication ,TK5101-6720 - Abstract
In this paper, we discuss educational courses for Internet of Things and related areas such as Machine to Machine communications and Smart Cities. The Internet of Things models introduce many new business prospects and, of course, they should be presented in the university curriculum. The purpose of the discussed educational program is to examine issues related to information and communication technologies used in Internet of Things projects and related areas based on them, such as Smart Cities. The educational course proposed in this paper aims to introduce students to modern information technology, standing for such areas as Machine to Machine communications, Internet of Things, and Smart Cities.
- Published
- 2017
- Full Text
- View/download PDF
37. Internet of Things: A General Overview between Architectures, Protocols and Applications
- Author
-
Marco Lombardi, Francesco Pascale, and Domenico Santaniello
- Subjects
Internet of Things ,machine to machine ,smart vehicle ,e-health ,smart building ,smart home ,Information technology ,T58.5-58.64 - Abstract
In recent years, the growing number of devices connected to the internet has increased significantly. These devices can interact with the external environment and with human beings through a wide range of sensors that, perceiving reality through the digitization of some parameters of interest, can provide an enormous amount of data. All this data is then shared on the network with other devices and with different applications and infrastructures. This dynamic and ever-changing world underlies the Internet of Things (IoT) paradigm. To date, countless applications based on IoT have been developed; think of Smart Cities, smart roads, and smart industries. This article analyzes the current architectures, technologies, protocols, and applications that characterize the paradigm.
- Published
- 2021
- Full Text
- View/download PDF
38. Towards energy efficient NB-IoT: A survey on evaluating its suitability for smart applications
- Author
-
Kamali Gupta, Pramod K. Singh, Malvinder Singh Bali, and Kanwalpreet Kour Bali
- Subjects
010302 applied physics ,Computer science ,business.industry ,End user ,02 engineering and technology ,Energy consumption ,021001 nanoscience & nanotechnology ,01 natural sciences ,Outreach ,Machine to machine ,Power consumption ,0103 physical sciences ,0210 nano-technology ,Smart applications ,Internet of Things ,business ,Telecommunications ,Efficient energy use - Abstract
With the Advancement of Technology, IoT has gained momentum by providing Machine to Machine (M2M) Communication bringing smart devices closer to the proximity of end users. Although IoT is expected to bring together 75.4 billion of devices by 2025, improving the quality of life beyond expectations, but we will have to pay a bigger price for all this in the form of expatiated energy consumption and carbon footprints. These Constraints have motivated researchers to put forward a solution for energy efficient green communication. However, the increasing number of devices annually is also a matter of concern. To deal with such an invidious situation, we have brought together two magnanimous technologies- NB-IoT and Green IoT. The concept of Green IoT has been of paramount importance as it addresses a very important IoT challenge by restricting energy usage of IoT devices and bringing forwards new tactics to deal with it. LPWA technology has come to the rescue, by connecting numerous devices over a wide domain with optimized battery life, utilizing very less power for connectivity and hence curbing the cost to a great extent. Various LPWA technologies like LoRA, Zigbee, Sigfox etc offer prominent solutions to the users by reducing Carbon emissions and making efficient Utilization of power resources but to provide a maximum global outreach of devices to the users and avoid Infrastructure cost, 3GPP in Release-13 provided a cellular based Licensed Technology called NB-IoT. This Technology provides features which can bring maximum benefits to LPWA technology in Market like Low power Consumption, massive connection to IoT devices and enhanced Indoor Coverage. In our research paper, we have highlighted the NB-IoT Technology, its technical features and applications. We have also made an effort in proposing a green NB-IoT model for Smart agriculture as an initiative to promote use of green IoT features and applications. Also Proposed NB-IoT model for Smart agriculture towards green IoT.
- Published
- 2022
39. M2M Potentials in logistics and transportation industry
- Author
-
Yasir Mehmood, Safdar Nawaz Khan Marwat, Koojana Kuladinithi, Anna Förster, Yasir Zaki, Carmelita Görg, and Andreas Timm-Giel
- Subjects
Road congestion ,Intelligent transportation systems ,Information and communication technologies ,Machine to machine ,Relay nodes ,LTE-Advanced ,Industries. Land use. Labor ,HD28-9999 ,Transportation and communications ,HE1-9990 - Abstract
All over the world, road congestion is among the most prevalent transport challenges usually in urban environments which not only increases fuel consumption and emission of harmful gases, but also causes stress for the drivers. Intelligent Transportation System (ITS) enables a better use of the infrastructure by connecting vehicles to other vehicles as well as infrastructure and thus delivers a faster communication opportunity to ensure safe and secure driving. Machine-to-machine (M2M) communication is one of the latest information and communication technologies which offers ubiquitous connectivity among several smart devices. The use of mobile (cellular) M2M communications has emerged due to the wide range, high reliability, increased data rates, decreased costs as well as easy and short-term deployment opportunities. Since the radio spectrum is a scarce resource, M2M traffic can potentially degrade the performance of mobile networks due to the large number of devices sending small-sized data. This paper presents an efficient data multiplexing scheme by using Long-Term Evolution Advanced (LTE-Advanced) Relay Nodes, which aggregates M2M traffic to maximize radio resource utilization. Extensive system-level simulations are performed using an LTE-Advanced-based model developed in the RIVERBED modeler to evaluate the performance of the proposed data multiplexing scheme. Simulation results show that approximately 40 % more smart M2M devices used in ITS and logistics are served per LTE-Advanced cell under the present system settings.
- Published
- 2016
- Full Text
- View/download PDF
40. Exploring cybersecurity issues in 5G enabled electric vehicle charging station with deep learning
- Author
-
Manoj Basnet and Mohd. Hasan Ali
- Subjects
TK1001-1841 ,business.product_category ,Distribution or transmission of electric power ,Computer science ,business.industry ,Energy Engineering and Power Technology ,Denial-of-service attack ,Systems and Control (eess.SY) ,Intrusion detection system ,TK3001-3521 ,Electrical Engineering and Systems Science - Systems and Control ,Charging station ,Machine to machine ,Production of electric energy or power. Powerplants. Central stations ,SCADA ,Control and Systems Engineering ,Control theory ,Electric vehicle ,FOS: Electrical engineering, electronic engineering, information engineering ,Electrical and Electronic Engineering ,SYN flood ,business ,Computer network - Abstract
The surging usage of electric vehicles (EVs) demand the robust deployment of trustworthy electric vehicle charging station (EVCS) with millisecond range latency and massive machine to machine communications where 5G could act. However, 5G suffers from inherent protocols, hardware, and software vulnerabilities that seriously threaten the communicating entities' cyber-physical security. To overcome these limitations in the EVCS system, this paper analyses the impact of False Data Injection (FDI) and Distributed Denial of Services (DDoS) attacks on the operation of EVCS. This work is an extension of our previously published conference paper about the EVCS. As new features, this paper simulates the FDI attack and the syn flood DDoS attacks on 5G enabled remote Supervisory Control and Data Acquisition (SCADA) system that controls the solar photovoltaics (PV) controller, Battery Energy Storage (BES) controller, and EV controller of the EVCS. The attacks make the EVCS system oscillate or shift the DC operating point. The frequency of oscillation, its damping, and the system's resiliency are found to be related to the attacks' intensity and target controller. Finally, we propose the novel stacked Long Short-Term Memory (LSTM) based intrusion detection systems (IDS) solely based on the electrical fingerprint. This model can detect the stealthy cyberattacks that bypass the cyber layer and go unnoticed in the monitoring system with nearly 100% detection accuracy., journal preprint
- Published
- 2021
41. A Comprehensive Survey on Interoperability for IIoT: Taxonomy, Standards, and Future Directions
- Author
-
AdhikariMainak, AmgothTarachand, HazraAbhishek, and SriramaSatish Narayana
- Subjects
World Wide Web ,Machine to machine ,General Computer Science ,Computer science ,business.industry ,Taxonomy (general) ,Interoperability ,Position (finance) ,Industrial Internet ,Internet of Things ,business ,Theoretical Computer Science - Abstract
In the era of Industry 4.0, the Internet-of-Things (IoT) performs the driving position analogous to the initial industrial metamorphosis. IoT affords the potential to couple machine-to-machine intercommunication and real-time information-gathering within the industry domain. Hence, the enactment of IoT in the industry magnifies effective optimization, authority, and data-driven judgment. However, this field undergoes several interoperable issues, including large numbers of heterogeneous IoT gadgets, tools, software, sensing, and processing components, joining through the Internet, despite the deficiency of communication protocols and standards. Recently, various interoperable protocols, platforms, standards, and technologies are enhanced and altered according to the specifications of the applicability in industrial applications. However, there are no recent survey papers that primarily examine various interoperability issues that Industrial IoT (IIoT) faces. In this review, we investigate the conventional and recent developments of relevant state-of-the-art IIoT technologies, frameworks, and solutions for facilitating interoperability between different IIoT components. We also discuss several interoperable IIoT standards, protocols, and models for digitizing the industrial revolution. Finally, we conclude this survey with an inherent discussion of open challenges and directions for future research.
- Published
- 2021
42. Decades of Internet of Things Towards Twenty-first Century: A Research-Based Introspective
- Author
-
Nagajayanthi, B.
- Subjects
IPv6 ,business.industry ,Computer science ,Interoperability ,Cloud computing ,Cyber-security ,Process automation system ,Article ,Standardization ,Computer Science Applications ,World Wide Web ,Voice user interface ,Machine to machine ,Transparency (graphic) ,The Internet ,Low-energy ,Electrical and Electronic Engineering ,business ,Internet-of-things - Abstract
Internet connects people to people, people to machine, and machine to machine for a life of serendipity through a Cloud. Internet of Things networks objects or people and integrates them with software to collect and exchange data. The Internet of things (IoT) influences our lives based on how we ruminate, respond, and anticipate. IoT 2021 heralds from the fringes to the data ecosystem and panaches a comfort zone. IoT is overwhelmingly embraced by businessmen and consumers due to increased productivity and convenience. Internet of Things facilitates intelligent device control with cloud vendors like Amazon and Google using artificial intelligence for data analytics, and with digital assistants like Alexa and Siri providing a voice user interface. Smart IoT is all about duplex connecting, processing, and implementing. Centralized IoT architecture is vulnerable to cyber-attacks. With Block Chain, it is possible to maintain transparency and security of the transaction's data. Robotic Process Automation (RPA) using bots has automated laborious tasks in 2019. Embedded Internet using Facial Recognition could reduce the coronavirus pandemic crisis by making a paradigm shift from fingerprint sensors to facial recognition. Security concerns are addressed with micro-segmentation approaches. IoT, an incredible vision of the future makes systems adaptive with customized features, responsive with increased efficiency, and procurable with optimized cost. This research delivers a comprehensive insight into the technical perspectives of IoT, focusing on interoperability, flexibility, scalability, mobility, security, transparency, standardization, and low energy. A smart classroom is implemented based on the concepts of IoT.
- Published
- 2021
43. A blockchain-based authentication scheme for the machine-to-machine communication of a cyber physical system
- Author
-
Yulin Wang, Yi Xie, and Maode Ma
- Subjects
Statistics and Probability ,Machine to machine ,Blockchain ,Artificial Intelligence ,Computer science ,business.industry ,General Engineering ,Cyber-physical system ,Authentication scheme ,business ,Computer network - Abstract
Today, the manner in which we communicate has greatly advanced. The technology is not just about machines, but people with technology together. Machine-to-machine (M2M) communication is unavoidable in the Internet of things. However, at the same time, there are more attacks against the M2M system. Therefore, a reliable and secure authentication mechanism is required. Blockchain technology is decentralized and highly secure while being tamper-proof. This protects M2M service providers by eliminating the single point of failures. This paper proposes a blockchain-based authentication scheme that uses a practical Byzantine fault tolerance (pBFT) consensus mechanism for M2M security in cyber physical systems. By implementing a blockchain to an M2M system, it provides an ID for devices on the blockchain. Simulation results have shown that the data on the chain cannot be altered. A pBFT consensus algorithm also ensures that the blockchain network is able to come to a consensus with faults.
- Published
- 2021
44. Group Based Vehicular Machine to Machine Communication Scheme in Cellular Networks
- Author
-
Kim, Kyu Chul, Park, Chan Jung, Kim, Ronny Yongho, Kim, Kuinam J., editor, and Ahn, Seong Jin, editor
- Published
- 2012
- Full Text
- View/download PDF
45. The Future of Communications Satellites
- Author
-
Pelton, Joseph N. and Pelton, Joseph N.
- Published
- 2012
- Full Text
- View/download PDF
46. A study of data quality dimensions and factors in machine to machine(M2M) big data
- Author
-
Seung-Ryol Maeng, Jae-Min Noh, Dong-Jin Park, and Dong-Sik Yang
- Subjects
Machine to machine ,Computer science ,business.industry ,General Mathematics ,Data quality ,Big data ,Data mining ,computer.software_genre ,business ,computer - Published
- 2021
47. Internet of Robotic Things: A Review
- Author
-
Sibar Khalid
- Subjects
Multimedia ,Computer science ,business.industry ,General Mathematics ,Frame (networking) ,Cloud computing ,Robotics ,computer.software_genre ,Machine to machine ,Robot ,The Internet ,Artificial intelligence ,Communications protocol ,business ,Implementation ,computer - Abstract
The Internet of Things (IoT) gives a strong structure for connecting things to the internet to facilitate Machine to Machine (M2M) communication and data transmission through basic network protocols such as TCP/IP. IoT is growing at a fast pace, and billions of devices are now associated, with the amount expected to reach trillions in the coming years. Many fields, including the army, farming, manufacturing, healthcare, robotics, and biotechnology, are adopting IoT for advanced solutions as technology advances. This paper offers a detailed view of the current IoT paradigm, specifically proposed for robots, namely the Internet of Robotic Things (IoRT). IoRT is a collection of various developments such as Cloud Computing, Artificial Intelligence (AI), Machine Learning, and the (IoT). This paper also goes over architecture, which would be essential in the design of Multi-Role Robotic Systems for IoRT. Furthermore, includes systems underlying IoRT, as well as IoRT implementations. The paper provides the foundation for researchers to imagine the idea of IoRT and to look beyond the frame while designing and implementing IoRT-based robotic systems in real-world implementations.
- Published
- 2021
48. Ultra-Lightweight Block Cipher in Medical Internet of Things for Secure Machine-to-Machine Communication Using FPGA
- Author
-
Gitanjali Rahul Shinde, Mahendra Balkrishna Salunke, and Parikshit N. Mahalle
- Subjects
Machine to machine ,business.industry ,Computer science ,Embedded system ,Clock rate ,Cryptosystem ,The Internet ,Cloud computing ,business ,Key management ,Field-programmable gate array ,Block cipher - Abstract
With the swift growth of internet applications with the Internet of Things (IoT), medical sensors and online medical service has become mandatory part of every use case in the recent years. The health care system has become more connected with the increasing use of IoT devices, and these medical devices introduce vulnerabilities into health care organizations. Recently, there are significant cyber-threats against the medical IoT and some resisting elements of cryptosystem that cloud help to combat these threats. Hence, in medical IoT, security and privacy of patients are among the major areas of concern. However, such methods are very complex to implement in Field Programmable Gate Array (FPGA) platforms. This paper proposes an ultra-lightweight block ciphers (ULBC) for medical IoT applications. The first contribution of ULBC algorithm is to propose the chaotic Whale optimization (CWO) algorithm for key management, which improves the security and reduce hardware cost by reducing the number of iteration rounds. The second contribution is to introduce the flexible design of modified ULBC algorithm that provides an area, power and delay efficient design with attack free feature. The flexible design avoids the reconfigurable runtime, power; and it is surely different from existing block ciphers. Finally, the ULBC algorithm is synthesized in Xilinx tool with different FPGA families and the performance is compared with existing lightweight ciphers in terms of maximum clock frequency, power consumption and hardware utilization.
- Published
- 2021
49. Priority‐based learning automata in Q‐learning random access scheme for cellular M2M communications
- Author
-
D. S. Shu'aibu, Lawal Bello, Nasir A. Shinkafi, and Paul D. Mitchell
- Subjects
Scheme (programming language) ,Theoretical computer science ,General Computer Science ,Learning automata ,TK7800-8360 ,Computer science ,q‐learning ,Q-learning ,learning automata ,TK5101-6720 ,Electronic, Optical and Magnetic Materials ,Machine to machine ,Telecommunication ,machine to machine ,Electrical and Electronic Engineering ,Electronics ,rach congestion ,computer ,lte network ,Random access ,computer.programming_language - Abstract
This paper applies learning automata to improve the performance of a Q‐learning based random access channel (QL‐RACH) scheme in a cellular machine‐to‐machine (M2M) communication system. A prioritized learning automata QL‐RACH (PLA‐QL‐RACH) access scheme is proposed. The scheme employs a prioritized learning automata technique to improve the throughput performance by minimizing the level of interaction and collision of M2M devices with human‐to‐human devices sharing the RACH of a cellular system. In addition, this scheme eliminates the excessive punishment suffered by the M2M devices by controlling the administration of a penalty. Simulation results show that the proposed PLA‐QL‐RACH scheme improves the RACH throughput by approximately 82% and reduces access delay by 79% with faster learning convergence when compared with QL‐RACH.
- Published
- 2021
50. 3P-SAKE: Privacy-preserving and physically secured authenticated key establishment protocol for wireless industrial networks
- Author
-
Karanjeet Choudhary, Mehedi Masud, Mamoun Alazab, and Gurjot Singh Gaba
- Subjects
Hardware security module ,Authentication ,Industry 4.0 ,Computer Networks and Communications ,Computer science ,Hash function ,020206 networking & telecommunications ,02 engineering and technology ,Computer security ,computer.software_genre ,Machine to machine ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,computer ,Protocol (object-oriented programming) ,Physical security ,Key exchange - Abstract
A new industrial revolution is emerging with the Internet of Things (IoT) growing use in enabling the machine to machine communication between the devices, sensors, actuators, and gateways. IoT lets the communication across devices and the network happen in real-time and helps make technologically smart homes, smart hospitals, and smart industrial applications. The authentication schemes in IoT have to be robust and lightweight to be useful for resource-constrained real-time applications where user privacy and physical security are the priority concerns. The IoT devices are prone to physical attacks due to their installation in hostile environments. The intruders want to physically capture the IoT nodes for cloning and accessing the stored confidential information, thus necessitating IoT nodes’ physical protection. This article proposes a less expensive and physically secured user authentication and secure key exchange protocol for industry 4.0 applications. Physically unclonable functions (PUF), hash, and XOR operations are used in the proposed method to attain robustness and efficiency. The scheme’s other benefits include low computational cost, retaining the device’s confidentiality, safety from major security threats, low communication, and storage overhead.
- Published
- 2021
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.