首页 | 官方网站   微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 0 毫秒
1.
Internet of Things (IoT) has very remarkable advantages over customary communication technologies. However, IoT suffers from different issues, such as limited battery life, low storage capacity, and little computing capacity. For this reason, in many IoT applications and devices, we require an alternative unit to execute the tasks from the user's device and return results. In general, the problem of limited resources by transferring the computation workload to other devices/systems with better resources is addressed by offloading computation. It can be focused on improving the application, extending battery life, or expanding storage capacity. The offloading operation can be performed based on various quality of service (QoS) parameters that contain computational demands for load balancing, response time, application, energy consumption, latency, and other things. Moreover, the systematic literature review (SLR) method is used to identify, assess, and integrate findings from all relevant studies that address one or more research questions on IoT offloading and conduct a comprehensive study of empirical research on offloading techniques. However, we present a new taxonomy for them based on offloading decision mechanisms and overall architectures. Furthermore, we offer a parametric comparison for the offloading methods. As well, we present the future direction and research opportunities in IoT offloading computation. This survey will assist academics and practitioners to directly understand the progress in IoT offloading.  相似文献   

2.
Wireless Personal Communications - Wireless sensor network (WSN) with mobile sink serves a lot of industrial and agricultural monitoring applications. The data collection with WSN has been...  相似文献   

3.
4.
This paper highlights the complexity and challenges of providing reliable services in the evolving communications infrastructure. The hurdles in providing end-to-end availability guarantees are discussed and research problems identified. Avenues for overcoming some of the challenges examined are presented. This includes the use of a highly available network spine embedded in a physical network together with efficient crosslayer mapping to offer survivability and differentiation of traffic into classes of resilience.  相似文献   

5.
Internet of Things (IoT) and its relevant technologies have been attracting the attention of researchers from academia, industry, and government in recent years. However, since the requirements of the IoT are quite different from what the Internet today can offer, several innovative techniques have been gradually developed and incorporated into IoT, which is referred to as the Future Internet of Things (FIoT). Among them, how to extract “data” and transfer them into “knowledge” from sensing layer to application layer has become a vital issue. This paper begins with an overview of IoT and FIoT, followed by discussions on how to apply data mining and computational intelligence to FIoT. An intelligent data management framework inspired by swarm optimization will then given. Finally, open issues and future trends of this field will be addressed.  相似文献   

6.
The emergence of Internet of Things (IoT) is empowered by the availability of the high volume of smart sensors, Radio Frequency Identification, a suitable communication technologies and protocols. In the near future, the Internet will be full of heterogeneous connected devices. In recent years, the IoT has drawn significant attention as it can solve difficult problems. However, the heterogeneity of devices and the large scale networks expose the IoT to many challenges that must be addressed; otherwise, the systems performance will deteriorate. As an attempt to identify these challenges, this paper comprehensibly cites the main IoT concepts, the serious IoT challenges and the quality of services presented in the recent literature. It also investigates the corresponding main research directions and the proposed solutions. This paper can increase the knowledge of the reader since it is the first IoT survey that presents load balancing algorithms utilized in solving the extreme data storage challenge.  相似文献   

7.
8.
物联网的特征、内涵、发展策略和挑战   总被引:1,自引:1,他引:0  
本文首先论述了物联网的内涵、体系架构及其战略意义.然后,讨论和分析了物联网的市场空间、行业特征和运营商在产业链中的定位.接下来,文章分析了物联网的流量分类特征、对于网络的影响以及物联网的核心技术.最后探讨了物联网的发展策略、主要挑战及其可能的未来.  相似文献   

9.
Internet technology is very pervasive today. The number of devices connected to the Internet, those with a digital identity, is increasing day by day. With the developments in the technology, Internet of Things (IoT) become important part of human life. However, it is not well defined and secure. Now, various security issues are considered as major problem for a full-fledged IoT environment. There exists a lot of security challenges with the proposed architectures and the technologies which make the backbone of the Internet of Things. Some efficient and promising security mechanisms have been developed to secure the IoT environment, however, there is a lot to do. The challenges are ever increasing and the solutions have to be ever improving. Therefore, aim of this paper is to discuss the history, background, statistics of IoT and security based analysis of IoT architecture. In addition, we will provide taxonomy of security challenges in IoT environment and taxonomy of various defense mechanisms. We conclude our paper discussing various research challenges that still exist in the literature, which provides better understanding of the problem, current solution space, and future research directions to defend IoT against different attacks.  相似文献   

10.
Internet of Things (IoT) is playing a more and more important role after its showing up, it covers from traditional equipment to general household objects such as WSNs and RFID. With the great potential of IoT, there come all kinds of challenges. This paper focuses on the security problems among all other challenges. As IoT is built on the basis of the Internet, security problems of the Internet will also show up in IoT. And as IoT contains three layers: perception layer, transportation layer and application layer, this paper will analyze the security problems of each layer separately and try to find new problems and solutions. This paper also analyzes the cross-layer heterogeneous integration issues and security issues in detail and discusses the security issues of IoT as a whole and tries to find solutions to them. In the end, this paper compares security issues between IoT and traditional network, and discusses opening security issues of IoT.  相似文献   

11.
A wireless sensor network (WSN) is a network of tiny sensors deployed to collect data. These sensors are powered with batteries that have limited power. Recharging and/or replacement of these batteries, however, are not always feasible. Over the past few years, WSN applications are being deployed in diverse fields such as military, manufacturing, healthcare, agriculture, and so on. With the ever-increasing applications of WSNs, improving the energy efficiency of the WSNs still remains to be a challenge. Applying fuzzy logic to the problem of clustering exploits the uncertainty associated with the factors that affect the lifetime of these sensors and enables the development of models that would improve their performance in real-world applications. We present a comprehensive review of various fuzzy-based techniques for clustering in WSNs whose main goal is to optimize energy usage in WSNs while simultaneously improving their overall performance.  相似文献   

12.
区块链技术原本基于由电脑组成的P2P网络中,如何将其应用于物联网中是一个值得考虑的问题。本文对物联网引入区块链技术遇到的主要挑战进行分析,并提出相应的应对思路。  相似文献   

13.
Network survivability is gaining increasing attention from the Internet research community. The ubiquity of IP services has fueled increasing interest in ensuring their dependability, by making IP networks more disruption-tolerant. After providing a brief overview of how routing is accomplished in the Internet, this article reviews how the protocols react to failures or changes in network state within an autonomous system. The problems associated with current restoration schemes, with respect to newer and more stringent requirements posed by emerging services such as voice over IP, are identified. We present an overview of the schemes proposed to ameliorate fault recovery and critique their contributions. We also outline future research directions for improving IP resilience.  相似文献   

14.

Vehicular Ad hoc Networks (VANETs) have drawn incredible interest in both academic and industrial sectors due to their potential applications and services. Vehicles’ position plays a significant role in many location-based applications and services such as public emergency, vehicles tracking, resource discovery, traffic monitoring and position-based routing. A location service is used to keep up-to-date records of current positions of vehicles. However, locating vehicles’ positions and maintaining an accurate view of the entire network are quite challenging tasks due to the high number of nodes, and high and fast nodes mobility which results in rapid topological changes and sudden network disconnections. In the past literature, various location-based services have been proposed to solve the above mentioned issues. Moreover, the cluster-based location service schemes have gained a growing interest due to their advantages over non-cluster-based schemes. The cluster-based schemes improve the network scalability, reduce the communications overhead and resolve the mobility issues within the clusters preventing them from propagating in the whole network. Therefore, this paper presents the taxonomy of the existing location service schemes, inspects the cluster-based location service by highlighting their strengths and limitations, and provides a comparison between location-based clustering and application specific clustering such as the one used in routing, information dissemination, channel access management and security. In addition, the existing clustering schemes, challenges and future directions for efficient cluster-based location service are also discussed.

  相似文献   

15.
Ramos  N. Panigrahi  D. Dey  S. 《IEEE network》2005,19(4):14-20
In order to support diverse application requirements, a new standard called IEEE 802.11e is being proposed to improve quality of service in wireless LAN networks. There are, however, a few remaining challenges that need to be addressed in order to enable comprehensive QoS support using 802.11e. In this article we provide an overview of a few of these challenges, describe their possible impact on QoS, and provide a survey of techniques that potentially could be used to address the identified challenges. Specifically, we focus on three challenges: handling time-varying network conditions, adapting to varying application profiles, and managing link layer resources. Additionally, we present several potential future directions toward improved QoS in wireless networks.  相似文献   

16.
17.
The Internet of Things (IoT) is a system that includes smart items with different sensors, advanced technologies, analytics, cloud servers, and other wireless devices that integrate and work together to create an intelligent environment that benefits end users. With its wide spectrum of applications, IoT is revolutionizing both the current and future generations of the Internet. IoT systems can be employed for broad-ranging real applications, such as agriculture, the environment, cities, healthcare, and the industrial sector. In this paper, we briefly discuss the three-tier architectural view of IoT, its different communication technologies, and the smart sensors. Moreover, we study various application areas of IoT such as the environmental domain, healthcare, agriculture, smart cities, and industrial, commercial, and general aspects. A critical analysis is shown for the existing schemes and techniques related to this work. Further, this paper addresses the basic context, tools and evaluation approaches, future scope, and the advantages and disadvantages of the aforestated IoT applications. A comprehensive analysis is provided for each domain along with its fundamental parameters like the quality of service (QoS), network longevity, scalability, energy efficiency, accuracy, and cost. Finally, this study highlights the technical challenges and open research problems existing in different IoT applications.  相似文献   

18.
Wireless Personal Communications - Nowadays traditional techniques of living and earning are being transformed to modern smart technologies, taking their inspiration from the emerging trends....  相似文献   

19.
Unquestionably, communicating entities (object, or things) in the Internet of Things (IoT) context are playing an active role in human activities, systems and processes. The high connectivity of intelligent objects and their severe constraints lead to many security challenges, which are not included in the classical formulation of security problems and solutions. The Security Shield for IoT has been identified by DARPA (Defense Advanced Research Projects Agency) as one of the four projects with a potential impact broader than the Internet itself. To help interested researchers contribute to this research area, an overview of the IoT security roadmap overview is presented in this paper based on a novel cognitive and systemic approach. The role of each component of the approach is explained, we also study its interactions with the other main components, and their impact on the overall. A case study is presented to highlight the components and interactions of the systemic and cognitive approach. Then, security questions about privacy, trust, identification, and access control are discussed. According to the novel taxonomy of the IoT framework, different research challenges are highlighted, important solutions and research activities are revealed, and interesting research directions are proposed. In addition, current standardization activities are surveyed and discussed to the ensure the security of IoT components and applications.  相似文献   

20.
The traditional Internet is oriented towards person-to-person connection, whereas the Internet of Things is oriented towards connection of inanimate objects. As such, the Internet of Things covers a larger range of connections and involves more semantics. Internet and telecom networks are focused on information transfer, while the Internet of Things is focused on information services. By combining sensor networks, the Internet, telecom networks, and cloud computing platforms, the Internet of Things can sense, recognize, affect, and control the physical world.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号