A Vision of Internet of Things

Authors

  • Sabeena S Department of Computer Applications, Bharathiar University, Coimbatore, India
  • Jaganathan M Department of Computer Science, Bharathiar University, Coimbatore, India

DOI:

https://doi.org/10.26438/ijcse/v7i2.492497

Keywords:

Emerging technologies, Internet of Things (IoT), networking architecture

Abstract

The Internet of Things (IoT’s) fast growth is affected by resource use and fears regarding privacy and security. An answer put together addressing security, efficiency, privacy, and measurability is required to support continued growth. We have a tendency to propose an answer shapely on human use of context and data, leveraging cloud resources to facilitate IoT on affected devices. We have a tendency to applying method information to provide security through abstraction and privacy through remote data fusion. We have a tendency to define the components and contemplate the key ideas of the “data proxy” and the “cognitive layer.” The information proxy uses system models to digitally mirror objects with lowest input information, whereas the cognitive layer applies these models to monitor the system’s evolution and to simulate the impact of commands before execution. The data proxy permits a system’s sensors to be sampled to fulfill a such quality of information target with lowest resource use.

References

[1] C. Perera, A. Zaslavsky, P. Christen, and D. Georgakopoulos, “Context aware computing for the Internet of Things: A survey,” IEEE Commun. Surveys Tuts., vol. 16, no. 1, pp. 414–454, 1st Quart., 2014.

[2] J. Gubbi, R. Buyya, S. Marusic, and M. Palaniswami, “Internet of Things (IoT): A vision, architectural elements, and future direc- tions,” Future Gener. Comput. Syst., vol. 29, no. 7, pp. 1645–1660, 2013. [Online]. Available: http://www.sciencedirect.com/science/article/ pii/S0167739X13000241

[3] L. Atzori, A. Iera, and G. Morabito, “The Internet of Things: A survey,” Comput. Netw., vol. 54, no. 15, pp. 2787–2805, Oct. 2010.

[4] C. C. Aggarwal, N. Ashish, and A. Sheth, The Internet of Things: A Survey From the Data-Centric Perspective. Boston, MA, USA: Springer, 2013, pp. 383–428, doi: 10.1007/978-1-4614-6309-2_12.

[5] K. Bhaduri and M. Stolpe, Distributed Data Mining in Sensor Networks. Boston, MA, USA: Springer, 2013, pp. 211–236, doi: 10.1007/978-1-4614-6309-2_8.

[6] S. Wang, J. Wan, D. Li, and C. Zhang, “Implementing smart factory of industrie 4.0: An outlook,” Int. J. Distrib. Sensor Netw., vol. 12, no. 1, p. 7, 2016, doi: 10.1155/2016/3159805.

[7] J. E. Siegel, “Data proxies, the cognitive layer, and application locality: Enablers of cloud-connected vehicles and next-generation Internet of Things,” Ph.D. dissertation, Dept. Mech. Eng., Massachusetts Inst. Technol., Cambridge, MA, USA, Jun. 2016. [Online]. Available: http://hdl.handle.net/1721.1/104456

[8] V. Chang and M. Ramachandran, “Towards achieving data security with the cloud computing adoption framework,” IEEE Trans. Services Comput., vol. 9, no. 1, pp. 138–151, Jan./Feb. 2016.

[9] L. Li, M. Rong, and G. Zhang, “An Internet of Things QoE evalua- tion method based on multiple linear regression analysis,” in Proc. 10th Int. Conf. Comput. Sci. Educ. (ICCSE), Cambridge, U.K., Jul. 2015, pp. 925–928.

[10] E. Wilhelm et al., “Cloudthink: A scalable secure platform for mir- roring transportation systems in the cloud,” Transport, vol. 30, no. 3, pp. 320–329, 2015.

[11] S. Mayer and J. Siegel, “Conversations with connected vehicles,” in Proc. 5th Int. Conf. Internet Things (IoT), Seoul, South Korea, Oct. 2015, pp. 38–44.

[12] O. Arias, J. Wurm, K. Hoang, and Y. Jin, “Privacy and security in Internet of Things and wearable devices,” IEEE Trans. Multi Scale Comput. Syst., vol. 1, no. 2, pp. 99–109, Apr./Jun. 2015.

[13] M.-H. Maras, “Internet of Things: Security and privacy implications,” Int. Data Privacy Law, vol. 5, no. 2, pp. 99–104, 2015.

[14] S. Notra, M. Siddiqi, H. H. Gharakheili, V. Sivaraman, and R. Boreli, “An experimental study of security and privacy risks with emerging household appliances,” in Proc. IEEE Conf. Commun. Netw. Security, San Francisco, CA, USA, Oct. 2014, pp. 79–84.

Downloads

Published

2019-02-28
CITATION
DOI: 10.26438/ijcse/v7i2.492497
Published: 2019-02-28

How to Cite

[1]
S. Sabeena and M. Jaganathan, “A Vision of Internet of Things”, Int. J. Comp. Sci. Eng., vol. 7, no. 2, pp. 492–497, Feb. 2019.