首页 | 官方网站   微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
物联网服务作为信息世界软件服务通过物联网向现实世界的延伸,其在物联网系统具有重要的作用.然而,不同于传统Web服务,物联网服务具有现实感知、数据驱动、异构分布、时空相关等新特点,使得现有的服务模型不足以对物联网服务有效刻画,进而也不能满足物联网应用中的后续服务发现、服务卸载、服务组合等需求.在凝练分析物联网服务建模需求和已有物联网服务模型的基础上,提出了一种基于实体-数据的物联网服务建模框架,该框架提出了服务、实体、数据三元信息融合的物联网服务模型概念及概念关系,重点定义了服务、实体、数据的时空属性及时空依赖关系,以支持基于时空相关性的物联网服务关联表示与分析,并通过扩展OWL-S(ontology Web language for services)给出了基于实体-数据的物联网服务描述方式.最后,结合一个高速公路物联网应用案例对模型的使用方式和效果进行了讨论.  相似文献   

2.
The vision of the Internet of Things (IoT) foresees a future Internet incorporating smart physical objects that offer hosted functionality as IoT services. These services when integrated with the traditional enterprise level services form the creation of ambient intelligence for a wide range of applications. To facilitate seamless access and service life cycle management of large, distributed and heterogeneous IoT resources, service oriented computing and resource oriented approaches have been widely used as promising technologies. However, a reference architecture integrating IoT services into either of these two technologies is still an open research challenge. In this article, we adopt the resource oriented approach to provide an end-to-end integration architecture of front-end IoT devices with the back-end business process applications. The proposed architecture promises a programmer friendly access to IoT services, an event management mechanism to propagate context information of IoT devices, a service replacement facility upon service failure, and a decentralized execution of the IoT aware business processes.  相似文献   

3.
When smart embedded devices become widely used in business and industry, many applications and services will emerge in a new Internet of Things (IoT) ecosystem. This will initiate new business opportunities in providing these novel applications and services, which integrate efficiently IoT services into business applications. Because IoT takes the reference scenarios further in terms of scale and features offered, it requires the development of suitable, scalable and available service delivery platforms that permit multiple services to coexist between IoT and 3rd party service providers. However, service delivery over IoT infrastructures is a difficult challenge that requires specific new architecture and mechanisms. This paper proposes a system architecture of hybrid service delivery that enables 3rd party service providers to create, deploy, execute, orchestrate, and manage efficiently the running instances of IoT services. In particular, this work focuses on the design and implementation of: agent-based hybrid service exposure, a hybrid service ontology engine crawler, a service enablers container, service-oriented agent lifecycle management, and an agent-mediated service lifecycle coordinator for messages dispatching and transformation between hybrid service exposure and the service enablers container. More specifically, with smart home scenarios, experimental results show that agent-based service delivery approaches could successfully coordinate between IoT and 3rd party service providers.  相似文献   

4.
ABSTRACT

With the manifestation of the Internet of Things (IoT) and fog computing, the quantity of edge devices is escalating exponentially all over the world, providing better services to the end user with the help of existing and upcoming communication infrastructures. All of these devices are producing and communicating a huge amount of data and control information around this open IoT environment. A large amount of this information contains personal and important information for the user as well as for the organization. The number of attack vectors for malicious users is high due to the openness, distributed nature, and lack of control over the whole IoT environment. For building the IoT as an effective service platform, end users need to trust the system. For this reason, security and privacy of information in the IoT is a great concern in critical infrastructures such as the smart home, smart city, smart healthcare, smart industry, etc. In this article, we propose three information hiding techniques for protecting communication in critical IoT infrastructure with the help of steganography, where RGB images are used as carriers for the information. We hide the information in the deeper layer of the image channels with minimum distortion in the least significant bit (lsb) to be used as indication of data. We analyze our technique both mathematically and experimentally. Mathematically, we show that the adversary cannot predict the actual information by analysis. The proposed approach achieved better imperceptibility and capacity than the various existing techniques along with better resistance to steganalysis attacks such as histogram analysis and RS analysis, as proven experimentally.  相似文献   

5.
These days Internet of Things (IoT), which consists of smart objects such as sensor nodes is the most important technology for providing intelligent services. In the IoT ecosystem, wireless sensor networks deliver collected information from IoT devices to a server via sink nodes, and IoT services are provided by peer-to-peer (P2P) networking between the server and the IoT devices. Particularly, IoT applications with wide service area requires the mobile sink nodes to cover the service area. To employ mobile sink nodes, the network adopts delay-tolerant capability by which delay-tolerant nodes try to transmit data when they connect to the mobile sink node in the application service field. However, if the connection status between a IoT device and a mobile sink node is not good, the efficiency of data forwarding will be decreased. In addition, retransmission in bad connection cause high energy consumption for data transmission. Therefore, data forwarding in the delay-tolerant based services needs to take the connection status into account. The proposed method predicts the connection status using naïve Bayesian classifier and determines whether the delay tolerant node transmits data to the mobile sink node or not. Furthermore, the efficiency of the proposed method was validated through extensive computer simulations.  相似文献   

6.
The purpose of the next internet of things (IoT) is that of making available myriad of services to people by high sensing intelligent devices capable of reasoning and real time acting. The convergence of IoT and multi-agent systems (MAS) provides the opportunity to benefit from the social attitude of agents in order to perform machine-to-machine (M2M) coopera-tion among smart entities. However, the selection of reliable partners for cooperation represents a hard task in a mobile and federated context, especially because the trustworthiness of devices is largely unreferenced. The issues discussed above can be synthesized by recalling the well known concept of social resilience in IoT systems, i.e., the capability of an IoT network to resist to possible attacks by malicious agent that potentially could infect large areas of the network, spamming unreliable infor-mation and/or assuming unfair behaviors. In this sense, social resilience is devoted to face malicious activities of software agents in their social interactions, and do not deal with the correct working of the sensors and other information devices. In this setting, the use of a reputation model can be a practicable and effective solution to form local communities of agents on the basis of their social capabilities. In this paper, we propose a framework for agents operating in an IoT environment, called ResIoT, where the formation of communities for collaborative purposes is performed on the basis of agent reputation. In order to validate our approach, we performed an experimental campaign by means of a simulated framework, which allowed us to verify that, by our approach, devices have not any economic convenience to performs misleading behaviors. Moreover, further experimental results have shown that our approach is able to detect the nature of the active agents in the systems (i.e., honest and malicious), with an accuracy of not less than 11% compared to the best competitor tested and highlighting a high resilience with respect to some malicious activities.   相似文献   

7.

For many systems, safe connectivity is an important requirement, even if the transmitting machines are resource-constrained. The advent of the Internet of Things (IoT) has also increased the demand for low-power devices capable of connecting with each other or sending data to a central processing site. The IoT allows many applications in a smart environment, such as outdoor activity control, smart energy, infrastructure management, environmental sensing, or cyber-security issues. Security in such situations remains an open challenge because of the resource-constrained design of sensors and objects, or the multi-purpose adversaries may target the process during the life cycle of a smart sensor. This paper discusses widely used protocols that provide safe communications for various applications in IoT and also different attacks are defined. In this paper, to protect the IoT objects and sensors, we propose a comprehensive and lightweight security protocol based on Cryptographic Ratchets. That is, an encrypted messaging protocol using the Double Ratchet Algorithm is defined which we call Singleton, and the implementation of protocol is tested and compared to the implementation of the IoT standard protocols and a post-quantum version of the protocol. Various cryptographic primitives are also evaluated, and their suitability for use in the protocol is tested. The results show that the protocol as the building stone not only enables efficient resource-wise protocols and architectures but also provides advanced and scalable IoT sensors. Our design and analysis demonstrate that Singleton security architecture can be easily integrated into existing network protocols such as IEEE 802.15.4 or OMA LWM2M, which offers several benefits that existing approaches cannot offer both performance and important security services. For chat applications such as WhatsApp, Skype, Facebook Private Messenger, Google Allo, and Signal, a cryptographic ratchet-based protocol provides end-to-end encryption, forward secrecy, backward secrecy, authentication, and deniability.

  相似文献   

8.
Nowadays, Internet of things has become as an inevitable aspect of humans’ IT-based life. A huge number of geo-distributed IoT enabled devices such as smart phones, smart cameras, health care systems, vehicles, etc. are connected to the Internet and manage users’ applications. The IoT applications are generally time sensitive, so that giving them up to Cloud and receiving the response may violate their required deadline, due to distance between user device and centralized Cloud data center and consequently increasing network latency. Fog environment, as an intermediate layer between Cloud and IoT devices, brings a smaller scales of Cloud capabilities closer to user location. Processing real time applications in Fog layer helps more deadlines to be met. Although Fog computing enhances quality of service parameters, limited resources and power of Fog nodes is a challenge in processing applications. Furthermore, the network latency is still an issue for communications between applications’ services and between user device and Fog node, which seriously threatens deadline condition. Regarding to mentioned points, this paper proposes a 3-partite deadline-aware applications’ services placement optimization model in Fog environment which optimizes total power consumption, total resources wastage, and total network latency, simultaneously. The proposed model prioritizes applications in 3 levels based on their associated deadline, and then the model is solved using a parallel model of first fit decreasing and genetic algorithm combination. Simulations results indicates the superiority of proposed approach against counterpart algorithms in terms of reducing power consumption, resource wastage, network latency, and service rejection rate.  相似文献   

9.
The emergence of Internet of Things (IoT) has introduced smart objects as the fundamental building blocks for developing a smart cyber-physical universal environment. The IoTs have innumerable daily life applications. The healthcare industry particularly has been benefited due to the provision of ubiquitous health monitoring, emergency response services, electronic medical billing, etc. Since IoT devices possess limited storage and processing power, therefore these intelligent objects are unable to efficiently provide the e-health facilities, or process and store enormous amount of collected data. IoTs are merged with Cloud Computing technology in Multi-Cloud form that basically helps cover the limitations of IoTs by offering a secure and on-demand shared pool of resources i.e., networks, servers, storage, applications, etc., to deliver effective and well-organized e-health amenities. Although the framework based on the integration of IoT and Multi-Cloud is contributing towards better patient care, yet on the contrary, it is challenging the privacy and reliability of the patients’ information. The purpose of this systematic literature review is to identify the top security threat and to evaluate the existing security techniques used to combat this attack and their applicability in IoT and Multi-Cloud based e-Healthcare environment.  相似文献   

10.
Ubiquitous networking, the interlinking of computers, consumer electronics, automobiles, home appliances, medical equipment, transportation systems, animals and plants through an overlapping of electronic spaces and physical spaces, is expected to provide an environment that enhances our lives through improved convenience, efficiency and safety in all areas.Today’s healthcare industry emphasizes safety, efficiency, patient-oriented approach, timeliness and balance. u-healthcare makes it possible to safely deliver appropriate services from any location at any time. To explain the emergence of u-healthcare, one must invoke, first of all, progress in IT and medical technology, and then the desire and willingness on the part of health care institutions to adopt the new service concept and increased health care demand. Digitalization of information, introduction of broadband communication and leaps made in healthcare technology in recent years have provided the technological capacity necessary for the achievement of u-healthcare.Based on recently reached theoretical results, integrating u-healthcare environments in virtual organizations, we proposed a methodology for the design and implementation of u-healthcare, linking the distributed mobile agents with medical entities into a convergence and collaborative environment. Despite the challenges in implementing and deploying u-healthcare, the advantages of ubiquitous healthcare are enabled by our smart model for the soft computing endowed ubiquitous. The strength of our approach is that it relates to u-healthcare a system which consists of its dual character emerging from the synergetic interaction between ubiquitous computing techniques and the mobile devices in convergence manner. We have developed a set of initial healthcare agent services on the mobile collaboration framework. We evaluate the functionality and effectiveness of our convergence mobile agent, whether the platform can manage services based on the model and whether the results of u-healthcare services discovery could satisfy user’s requirements with example cases.  相似文献   

11.
In recent times, the Internet of Things (IoT) applications, including smart transportation, smart healthcare, smart grid, smart city, etc. generate a large volume of real-time data for decision making. In the past decades, real-time sensory data have been offloaded to centralized cloud servers for data analysis through a reliable communication channel. However, due to the long communication distance between end-users and centralized cloud servers, the chances of increasing network congestion, data loss, latency, and energy consumption are getting significantly higher. To address the challenges mentioned above, fog computing emerges in a distributed environment that extends the computation and storage facilities at the edge of the network. Compared to centralized cloud infrastructure, a distributed fog framework can support delay-sensitive IoT applications with minimum latency and energy consumption while analyzing the data using a set of resource-constraint fog/edge devices. Thus our survey covers the layered IoT architecture, evaluation metrics, and applications aspects of fog computing and its progress in the last four years. Furthermore, the layered architecture of the standard fog framework and different state-of-the-art techniques for utilizing computing resources of fog networks have been covered in this study. Moreover, we included an IoT use case scenario to demonstrate the fog data offloading and resource provisioning example in heterogeneous vehicular fog networks. Finally, we examine various challenges and potential solutions to establish interoperable communication and computation for next-generation IoT applications in fog networks.  相似文献   

12.
为了提高物联网设备的互联性及数据处理效率,以智能家居领域为例,设计并实现一种通用的数据服务中间件.通过引入虚拟实体和协议适配器,该中间件可以适配物联网环境中常用设备通信协议,并支持新协议的动态注册.对物联网环境感知数据进行数据建模,以消除数据格式的异构性.通过配置数据处理规则,对物理空间中不同指标对应的数据实现相应的异...  相似文献   

13.
In the field of “U-Healthcare Service”, many studies have been actively conducted to develop “smart device”-based healthcare applications that enable healthcare providers and patients to be better served through interoperations among various kinds of sensors and wireless network interfaces. In particular, contemporary intelligent healthcare services not only recognize users’ context information through smart devices, computers, and so forth, but also acquire information from heterogeneous sensors to achieve context-aware inference services. Among such information, the weather information is tightly related to diseases such as asthma and allergies. Therefore, there is a high demand for research to utilize the weather information for healthcare services. In this paper, we propose a context inference-based intelligent healthcare service that exploits both the weather conditions information and the diverse healthcare ontologies available on the Internet. The proposed service aims at modeling a context ontology in users’ healthcare service environment and defining the inference rules, thereby accomplishing a satisfactory real-time healthcare service.  相似文献   

14.
A smart home usually has a variety of devices or home appliance, instead of designing software for a specific home, this paper proposes a service-oriented framework with a set of ontology systems to support service and device publishing, discovery of devices and their services, composition of control software using existing control services that wrap devices, deployment, and execution of the composed service in an computing environment, monitoring the execution, and recovery from device failure. The ontology systems specify semantic information about devices, services, and workflows used in various smart home, and users can compose and recompose services for their specific needs. New devices, workflows, and services can be added into ontology. Most of the steps in this process can be automated including code generation. For example, service composition will be carried out in three steps: abstract workflow design, function construction, and device discovery, and different codes can be generated for different computing platforms such as Java and Open Services Gateway initiative environments. In this way, a variety of smart home can be constructed rapidly using the framework by discovery and composition using existing services and workflows. This paper illustrates this framework using a media control example to illustrate the ontology, discovery, composition, deployment, execution, monitoring, and recovery.  相似文献   

15.
The Internet of Things (IoT) is a paradigm aimed at connecting everyday objects to the internet. IoT applications include smart cities, healthcare, agriculture, as well as the industry and manufacturing. The ability to monitor and control the physical world using information technology creates many opportunities. However, it also comes with some costs. The exponential growth of connected devices, the heterogeneity of IoT use cases, and the diversity of the network technologies yield a concern regarding IoT sustainability. With this work, we aim to contribute to this concern. In doing so, we introduce a novel representation model that is destined for (i) monitoring the IoT environment at runtime, (ii) expressing the overall quality of the system, and (iii) helping to utilize the available resources efficiently. We also define a feature set that describes the best the expectations of decentralized IoT platforms. Furthermore, we describe a quality-enabled decentralized IoT architecture too that incorporates the specified feature set as well as our representation model. Such solutions are necessary to improve and maintain IoT of the future and all its application domains, including the Industrial Internet of Things (IIoT). With the presented research, we aim to encourage the efficient utilization of resources and simplify the production of next-generation IoT solutions.  相似文献   

16.
The maturity of Industrial 4.0 technologies (smart wearable sensors, Internet of things [IoT], cloud computing, etc.) has facilitated the iteration and digitization of rehabilitation assistive devices (RADs) and the innovative development of intelligent manufacturing systems of RADs, expanding the value-added component of smart healthcare services. The intelligent manufacturing service mode, based on the concept of the product life cycle, completes the multi-source data production process analysis and the optimization of manufacturing, operation, and maintenance through intelligent industrial Internet of things and other means and improves the product life cycle management and operation mechanism. The smart product-service system (PSS) realizes the value-added of products by providing users with personalized products and value-added services, service efficiency, and sustainable development and gradually forms an Internet-product-service ecosystem. However, research on the PSS of RADs for special populations is relatively limited. Thus, this paper provides an overview of an IoT-based production model for RADs and a smart PSS-based development method of multimodal healthcare value-added services for special people. Taking the hand rehabilitation training devices for autistic children as a case, this paper verifies the effectiveness and availability of the proposed method. Compared with the traditional framework, the method used in this paper primarily helps evaluate rehabilitation efficacy, personalizes schemes for patients, provides auxiliary intelligent manufacturing service data and digital rehabilitation data for RAD manufacturers, and optimizes the product iteration development procedures by combining user-centered product interaction, multimodal evaluation, and value-added design. This study incorporates the iterative design of RADs into the process of smart PSS to provide some guidance to the RADs design manufacturers.  相似文献   

17.
The Internet of Things (IoTs) is apace growing, billions of IoT devices are connected to the Internet which communicate and exchange data among each other. Applications of IoT can be found in many fields of engineering and sciences such as healthcare, traffic, agriculture, oil and gas industries, and logistics. In logistics, the products which are to be transported may be sensitive and perishable, and require controlled environment. Most of the commercially available logistic containers are not integrated with IoT devices to provide controlled environment parameters inside the container and to transmit data to a remote server. This necessitates the need for designing and fabricating IoT based smart containers. Due to constrained nature of IoT devices, these are prone to different cyber security attacks such as Denial of Service (DoS), Man in Middle (MITM) and Replay. Therefore, designing efficient cyber security framework are required for smart container. The Datagram Transport Layer Security (DTLS) Protocol has emerged as the de facto standard for securing communication in IoT devices. However, it is unable to minimize cyber security attacks such as Denial of Service and Distributed Denial of Service (DDoS) during the handshake process. The main contribution of this paper is to design a cyber secure framework by implementing novel hybrid DTLS protocol in smart container which can efficiently minimize the effects of cyber attacks during handshake process. The performance of our proposed framework is evaluated in terms of energy efficiency, handshake time, throughput and packet delivery ratio. Moreover, the proposed framework is tested in IoT based smart containers. The proposed framework decreases handshake time more than 9% and saves 11% of energy efficiency for transmission in compare of the standard DTLS, while increases packet delivery ratio and throughput by 83% and 87% respectively.  相似文献   

18.
Abhik Chaudhuri 《EDPACS》2017,56(4):7-18
This article discusses the various dimensions of philosophy of information for the Internet of Things (IoT) technology. The aspects of attention, subjectivity, objectivity, happiness, key ethical concerns, and the need for algorithmic transparency and accountability in autonomous IoT applications that are necessary to build an IoT belief system have been highlighted here. The interplay of smart devices, smart services, and humans has been depicted to highlight trust permeability in human and IoT interfaces.  相似文献   

19.
The paper proposes the use of Node-RED, a flow-based programming tool targeted to Internet of Things (IoT), along with a series of case studies related to different IoT contexts, which demonstrate Node-RED's potentialities and outcomings toward the realization of well-structured IoT environments. The analyzed applications potentially include a wide range of domains, ranging from smart cities, smart buildings, smart homes/offices, smart retailing, to smart transportation, smart logistics, smart agriculture, smart health, military scenarios, and so on. The motivations behind the presented work are related to the fact that IoT application fields usually involve the same technologies and communication protocols, which are frequently adopted for totally different purposes. Issues such as systems' interoperabiliy, scalability, security and privacy naturally emerge, due to the huge amount of heterogeneous devices acting in the IoT environment itself and to the wireless nature of information transmissions. As a consequence, it is fundamental to dispose of adequate tools for supporting developers in design the network architecture and messages' exchange, in order to realize efficient and effective IoT network infrastructures.  相似文献   

20.
A recent emerging issue in information technology is the convergence of different kinds of applications. Convergence brings a user-centric environment to provide computing and communication services. In order to realize IT advantages, it requires the integration of security and data management to be suitable for pervasive computing environments. Security convergence refers to the convergence of two historically distinct security functions—physical security and information security—within enterprises; both are integral parts of any coherent risk management program. In this special issue, we have discussed current IT-Converged security issues, security policy and new security services which will lead to successful transfer smart space which is a new paradigm of future.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号