Search results for "things"

showing 10 items of 196 documents

Fuzzy Logic Based Security Trust Evaluation for IoT Environments

2019

In the new technological era called the Internet of Things (IoT), people, machines and objects communicate with each other via the Internet by exchanging information. In this context, trust plays an important role and is considered as a key factor in the success of the IoT services expansion. IoT services and applications use in some cases data concerning the privacy of their users. Consequently, users should trust the entities exchanging their personal information. In this paper, we present a framework that evaluates the security trust level of IoT nodes based on a Fuzzy Logic model using different input parameters such as Device Physical Security, Device Security Level and Device Ownershi…

Computer scienceContext (language use)02 engineering and technology[INFO] Computer Science [cs]TrustComputer securitycomputer.software_genreFuzzy logicFuzzy LogicFactor (programming language)Node (computer science)0202 electrical engineering electronic engineering information engineeringcomputer.programming_languagePrivacy.[INFO.INFO-NI] Computer Science [cs]/Networking and Internet Architecture [cs.NI]business.industry020206 networking & telecommunicationsInternet of Things (IoT)SecurityKey (cryptography)020201 artificial intelligence & image processingThe InternetbusinessPersonally identifiable informationcomputerPhysical security2019 IEEE/ACS 16th International Conference on Computer Systems and Applications (AICCSA)
researchProduct

MAC Protocols for Wake-up Radio: Principles, Modeling and Performance Analysis

2018

[EN] In wake-up radio (WuR) enabled wireless sensor networks (WSNs), a node triggers a data communication at any time instant by sending a wake-up call (WuC) in an on-demand manner. Such wake-up operations eliminate idle listening and overhearing burden for energy consumption in duty-cycled WSNs. Although WuR exhibits its superiority for light traffic, it is inefficient to handle high traffic load in a network. This paper makes an effort towards improving the performance of WuR under diverse load conditions with a twofold contribution. We first propose three protocols that support variable traffic loads by enabling respectively clear channel assessment (CCA), backoff plus CCA, and adaptive …

Computer scienceWireless sensor networks (WSNs)02 engineering and technology01 natural sciencesWake-up radio (WuR)Medium access control (MAC) protocol0202 electrical engineering electronic engineering information engineeringElectrical and Electronic EngineeringLatency (engineering)QueueEnergy-efficient communicationbusiness.industryNode (networking)010401 analytical chemistryComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS020206 networking & telecommunicationsEnergy consumptionINGENIERIA TELEMATICA0104 chemical sciencesComputer Science ApplicationsInternet of Things (IoT)Variable (computer science)Modeling and performance evaluationControl and Systems EngineeringbusinessWireless sensor networkInformation SystemsComputer networkEfficient energy useData transmission
researchProduct

Adoption of Constrained Application Protocol

2016

Among billions of Internet enabled devices that are expected to surround us in the near future, many will be resource constrained, i.e., will have limited power supply, processing power and memory. To cope with these limitations, the Constrained Application Protocol (CoAP) has been recently introduced as a lightweight alternative to HTTP for connecting the resource limited devices to the Web. Although the new protocol offers solid technical advantages, it remains uncertain whether a successful uptake will follow, as it depends also on its economic feasibility for the involved stakeholders. Therefore, this paper studies the techno-economic feasibility of CoAP using a systematic methodologica…

Computer sciencebusiness.industryPerspective (graphical)Techno economic020206 networking & telecommunications02 engineering and technologyComputer securitycomputer.software_genreConstrained Application ProtocolWeb of ThingsRisk analysis (engineering)Software deployment0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingThe InternetLiterature surveybusinesscomputerProtocol (object-oriented programming)International Journal of Innovation in the Digital Economy
researchProduct

Knowledge-based verification of concatenative programming patterns inspired by natural language for resource-constrained embedded devices

2020

We propose a methodology to verify applications developed following programming patterns inspired by natural language that interact with physical environments and run on resource-constrained interconnected devices. Natural language patterns allow for the reduction of intermediate abstraction layers to map physical domain concepts into executable code avoiding the recourse to ontologies, which would need to be shared, kept up to date, and synchronized across a set of devices. Moreover, the computational paradigm we use for effective distributed execution of symbolic code on resource-constrained devices encourages the adoption of such patterns. The methodology is supported by a rule-based sys…

Computer scienceinternet of thing02 engineering and technologycomputer.software_genrelcsh:Chemical technologyBiochemistryOracleArticleAnalytical ChemistryDomain (software engineering)Softwarewireless sensor network0202 electrical engineering electronic engineering information engineeringlcsh:TP1-1185Electrical and Electronic Engineeringdistributed programmingwireless sensor networksEmbedded systemInstrumentationAbstraction (linguistics)concatenative languagessymbolic programmingSettore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniSymbolic programmingProgramming languagebusiness.industryRuntime verification020206 networking & telecommunications020207 software engineeringcomputer.file_formatforthinternet of thingsAtomic and Molecular Physics and Opticsconcatenative languageProgramming patternsembedded systemsExecutablebusinesscomputerNatural language
researchProduct

Optimization of flat area coverage under connectivity constraint in wireless sensor networks

2022

A wireless sensor network consists of a set of small autonomous units that interact via a network built by their communication modules. They observe their environment, capture information, then manage this information according to their computing and/or storage capacity. To effectively accomplish their task(s), they need to cover as much of the area of interest as possible. It is therefore essential to quantify the quality of their coverage. In this thesis, we therefore seek to best cover an area of interest, with a precise number of sensors. While taking into account the possible overlaps between sensors, we first deploy in a zone of regular dimensions and evaluate the exact coverage using…

ConnectivityGenetic AlgorithmConnectivitéAlgorithme génétiqueInternet des objets[INFO.INFO-TS] Computer Science [cs]/Signal and Image ProcessingRéseaux de capteurs sans filInternet Of ThingsCouverture de zoneWireless sensor networksArea Coverage
researchProduct

Consumer Acceptance Determinants of Internet of Things : A New Perspective

2018

International audience; Despite the rising popularity of Internet of Things (IoT), consumer acceptance continues to grow at a slow pace. For example, adoption of health and fitness wearables is still relatively low and about a half of consumers abandon their wearables within the first six months. This pattern means that firms engaged in IoT industry can not recover their development and marketing costs. Recent research offer a fragmented view of the determinants of IoT consumer acceptance and focus mainly on functional attributes.This paper aims to provide a new perspective. Drawing on the service-dominant logic, the perceived value conceptualization and the customer experience approach, ou…

Consumer acceptanceInternet of Things[SHS.GESTION]Humanities and Social Sciences/Business administration[SHS.GESTION] Humanities and Social Sciences/Business administration
researchProduct

Design and Implementation of Real-Time Kitchen Monitoring and Automation System Based on Internet of Things

2022

Automation can now be found in nearly every industry. However, home automation has yet to reach Pakistan. This paper presents an Internet of Things smart kitchen project that includes automation and monitoring. In this project, a system was developed that automatically detects the kitchen temperature. It also monitors the humidity level in the kitchen. This system includes built-in gas detection sensors that detect any gas leaks in the kitchen and notify the user if the gas pressure in the kitchen exceeds a certain level. This system also allows the user to remotely control appliances such as freezers, ovens, and air conditioners using a mobile phone. The user can control gas levels using t…

Control and OptimizationRenewable Energy Sustainability and the EnvironmentInternet of Things; smart kitchen; monitoring system; automation system; home appliancesEnergy Engineering and Power TechnologyBuilding and ConstructionElectrical and Electronic EngineeringEngineering (miscellaneous)VDP::Teknologi: 500::Informasjons- og kommunikasjonsteknologi: 550Energy (miscellaneous)
researchProduct

Next Generation Home Sharing: Disrupting Platform Organizations with Blockchain Technology and the Internet of Things?

2020

During the last decade, the sharing economy has given birth to a number of market mediators, which have grown to become the world’s most valuable companies. Centralized sharing platforms like Uber, Didi Chuxing, and Airbnb have transformed several traditional industries. However, with the rise of the blockchain technology, some voices predict that these platform companies will soon be at risk of being disrupted themselves. In this chapter, we address the question of whether blockchain technology has given birth to a new breed of sharing economy platforms that can challenge the incumbents’ business models. We identify five different stages of the application of blockchain technology in emerg…

CopyingBlockchainSharing economybusiness.industryCritical factorsPotential marketBusinessBusiness modelInternet of ThingsBarriers to entryIndustrial organization
researchProduct

A framework for evaluating Internet-of-Things platforms: Application provider viewpoint

2014

Widespread adoption of Internet of Things (IoT) applications assumes a sustainable ecosystem of firms creating, distributing, and using these applications. Such an ecosystem often forms around a platform that implements commonly used functionality and offers it to the members of the ecosystem for creating applications and services. In IoT, such a platform may be materialized in a form of a cloud platform that supports the management of connected devices, and the development and use of the applications based on them. A number of cloud platforms targeting IoT applications are available in the market; to prosper, they need to assist the providers of the IoT applications in designing and develo…

Cover (telecommunications)Javabusiness.industryComputer scienceCloud computingApplication softwarecomputer.software_genreMaturity (finance)World Wide WebSoftwareThe InternetbusinessInternet of Thingscomputercomputer.programming_language2014 IEEE World Forum on Internet of Things (WF-IoT)
researchProduct

Cyber Security and the Internet of Things: Vulnerabilities, Threats, Intruders and Attacks

2015

Internet of Things (IoT) devices are rapidly becoming ubiquitous while IoT services are becoming pervasive. Their success has not gone unnoticed and the number of threats and attacks against IoT devices and services are on the increase as well. Cyber-attacks are not new to IoT, but as IoT will be deeply interwoven in our lives and societies, it is becoming necessary to step up and take cyber defense seriously. Hence, there is a real need to secure IoT, which has consequently resulted in a need to comprehensively understand the threats and attacks on IoT infrastructure. This paper is an attempt to classify threat types, besides analyze and characterize intruders and attacks facing IoT device…

Cyber defenseComputer Networks and CommunicationsHardware and Architecturebusiness.industryComputer scienceInternet privacyCyber-attackInternet of ThingsbusinessComputer securitycomputer.software_genrecomputerJournal of Cyber Security and Mobility
researchProduct