A Vision of Internet of Things
DOI:
https://doi.org/10.26438/ijcse/v7i2.492497Keywords:
Emerging technologies, Internet of Things (IoT), networking architectureAbstract
The Internet of Things (IoT’s) fast growth is affected by resource use and fears regarding privacy and security. An answer put together addressing security, efficiency, privacy, and measurability is required to support continued growth. We have a tendency to propose an answer shapely on human use of context and data, leveraging cloud resources to facilitate IoT on affected devices. We have a tendency to applying method information to provide security through abstraction and privacy through remote data fusion. We have a tendency to define the components and contemplate the key ideas of the “data proxy” and the “cognitive layer.” The information proxy uses system models to digitally mirror objects with lowest input information, whereas the cognitive layer applies these models to monitor the system’s evolution and to simulate the impact of commands before execution. The data proxy permits a system’s sensors to be sampled to fulfill a such quality of information target with lowest resource use.
References
[1] C. Perera, A. Zaslavsky, P. Christen, and D. Georgakopoulos, “Context aware computing for the Internet of Things: A survey,” IEEE Commun. Surveys Tuts., vol. 16, no. 1, pp. 414–454, 1st Quart., 2014.
[2] J. Gubbi, R. Buyya, S. Marusic, and M. Palaniswami, “Internet of Things (IoT): A vision, architectural elements, and future direc- tions,” Future Gener. Comput. Syst., vol. 29, no. 7, pp. 1645–1660, 2013. [Online]. Available: http://www.sciencedirect.com/science/article/ pii/S0167739X13000241
[3] L. Atzori, A. Iera, and G. Morabito, “The Internet of Things: A survey,” Comput. Netw., vol. 54, no. 15, pp. 2787–2805, Oct. 2010.
[4] C. C. Aggarwal, N. Ashish, and A. Sheth, The Internet of Things: A Survey From the Data-Centric Perspective. Boston, MA, USA: Springer, 2013, pp. 383–428, doi: 10.1007/978-1-4614-6309-2_12.
[5] K. Bhaduri and M. Stolpe, Distributed Data Mining in Sensor Networks. Boston, MA, USA: Springer, 2013, pp. 211–236, doi: 10.1007/978-1-4614-6309-2_8.
[6] S. Wang, J. Wan, D. Li, and C. Zhang, “Implementing smart factory of industrie 4.0: An outlook,” Int. J. Distrib. Sensor Netw., vol. 12, no. 1, p. 7, 2016, doi: 10.1155/2016/3159805.
[7] J. E. Siegel, “Data proxies, the cognitive layer, and application locality: Enablers of cloud-connected vehicles and next-generation Internet of Things,” Ph.D. dissertation, Dept. Mech. Eng., Massachusetts Inst. Technol., Cambridge, MA, USA, Jun. 2016. [Online]. Available: http://hdl.handle.net/1721.1/104456
[8] V. Chang and M. Ramachandran, “Towards achieving data security with the cloud computing adoption framework,” IEEE Trans. Services Comput., vol. 9, no. 1, pp. 138–151, Jan./Feb. 2016.
[9] L. Li, M. Rong, and G. Zhang, “An Internet of Things QoE evalua- tion method based on multiple linear regression analysis,” in Proc. 10th Int. Conf. Comput. Sci. Educ. (ICCSE), Cambridge, U.K., Jul. 2015, pp. 925–928.
[10] E. Wilhelm et al., “Cloudthink: A scalable secure platform for mir- roring transportation systems in the cloud,” Transport, vol. 30, no. 3, pp. 320–329, 2015.
[11] S. Mayer and J. Siegel, “Conversations with connected vehicles,” in Proc. 5th Int. Conf. Internet Things (IoT), Seoul, South Korea, Oct. 2015, pp. 38–44.
[12] O. Arias, J. Wurm, K. Hoang, and Y. Jin, “Privacy and security in Internet of Things and wearable devices,” IEEE Trans. Multi Scale Comput. Syst., vol. 1, no. 2, pp. 99–109, Apr./Jun. 2015.
[13] M.-H. Maras, “Internet of Things: Security and privacy implications,” Int. Data Privacy Law, vol. 5, no. 2, pp. 99–104, 2015.
[14] S. Notra, M. Siddiqi, H. H. Gharakheili, V. Sivaraman, and R. Boreli, “An experimental study of security and privacy risks with emerging household appliances,” in Proc. IEEE Conf. Commun. Netw. Security, San Francisco, CA, USA, Oct. 2014, pp. 79–84.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
