SwePub
Sök i SwePub databas

  Utökad sökning

Träfflista för sökning "L773:2542 6605 "

Sökning: L773:2542 6605

  • Resultat 1-10 av 20
Sortera/gruppera träfflistan
   
NumreringReferensOmslagsbildHitta
1.
  • Al-Dulaimy, Auday, et al. (författare)
  • The computing continuum : From IoT to the cloud
  • 2024
  • Ingår i: Internet of Things. - : Elsevier B.V.. - 2543-1536 .- 2542-6605. ; 27
  • Tidskriftsartikel (refereegranskat)abstract
    • In the era of the IoT revolution, applications are becoming ever more sophisticated and accompanied by diverse functional and non-functional requirements, including those related to computing resources and performance levels. Such requirements make the development and implementation of these applications complex and challenging. Computing models, such as cloud computing, can provide applications with on-demand computation and storage resources to meet their needs. Although cloud computing is a great enabler for IoT and endpoint devices, its limitations make it unsuitable to fulfill all design goals of novel applications and use cases. Instead of only relying on cloud computing, leveraging and integrating resources at different layers (like IoT, edge, and cloud) is necessary to form and utilize a computing continuum. The layers’ integration in the computing continuum offers a wide range of innovative services, but it introduces new challenges (e.g., monitoring performance and ensuring security) that need to be investigated. A better grasp and more profound understanding of the computing continuum can guide researchers and developers in tackling and overcoming such challenges. Thus, this paper provides a comprehensive and unified view of the computing continuum. The paper discusses computing models in general with a focus on cloud computing, the computing models that emerged beyond the cloud, and the communication technologies that enable computing in the continuum. In addition, two novel reference architectures are presented in this work: one for edge–cloud computing models and the other for edge–cloud communication technologies. We demonstrate real use cases from different application domains (like industry and science) to validate the proposed reference architectures, and we show how these use cases map onto the reference architectures. Finally, the paper highlights key points that express the authors’ vision about efficiently enabling and utilizing the computing continuum in the future.
  •  
2.
  • Alkhabbas, Fahed, et al. (författare)
  • Characterizing Internet of Things Systems through Taxonomies : A Systematic Mapping Study
  • 2019
  • Ingår i: Internet of Things. - : Elsevier. - 2542-6605. ; 7
  • Forskningsöversikt (refereegranskat)abstract
    • During the last decade, a large number of different definitions and taxonomies of Internet of Things (IoT) systems have been proposed. This has resulted in a fragmented picture and a lack of consensus about IoT systems and their constituents. To provide a better understanding of this issue and a way forward, we have conducted a Systematic Mapping Study (SMS) of existing IoT System taxonomies. In addition, we propose a characterization of IoT systems synthesized from the existing taxonomies, which provides a more holistic view of IoT systems than previous taxonomies. It includes seventeen characteristics, divided into two groups: elements and quality aspects. Finally, by analyzing the results of the SMS, we draw future research directions.
  •  
3.
  • Asadi Bagloee, Saeed, et al. (författare)
  • Tradable mobility permit with Bitcoin and Ethereum – A Blockchain application in transportation
  • 2019
  • Ingår i: Internet of Things (Netherlands). - : Elsevier BV. - 2542-6605. ; 8
  • Tidskriftsartikel (refereegranskat)abstract
    • Blockchain and its underlying technology have intrigued researchers with its promising applications and implications as “the second internet”. There is a wide range of Blockchain applications in transportation and logistics. In this paper, we present the basic principle of cryptocurrencies and Blockchain as well as Ethereum. This is followed by the potential applications of Blockchain in transportation, logistics, and supply chain industries in which the concept of a tradable mobility permit (TMP) to combat traffic congestion is formulated and numerically tested. We then discuss the deployment of the TMP scheme based on a Blockchain platform and its by-products such as dynamic toll pricing, priority for emergency vehicles, heavy truck platooning, as well as connected vehicles.
  •  
4.
  • Ashouri, Majid, et al. (författare)
  • Quality attributes in edge computing for the Internet of Things : A systematic mapping study
  • 2021
  • Ingår i: Internet of Things. - : Elsevier. - 2542-6605. ; 13
  • Tidskriftsartikel (refereegranskat)abstract
    • Many Internet of Things (IoT) systems generate a massive amount of data needing to be processed and stored efficiently. Cloud computing solutions are often used to handle these tasks. However, the increasing availability of computational resources close to the edge has prompted the idea of using these for distributed computing and storage. Edge computing may help to improve IoT systems regarding important quality attributes like latency, energy consumption, privacy, and bandwidth utilization. However, deciding where to deploy the various application components is not a straightforward task. This is largely due to the trade-offs between the quality attributes relevant for the application. We have performed a systematic mapping study of 98 articles to investigate which quality attributes have been used in the literature for assessing IoT systems using edge computing. The analysis shows that time behavior and resource utilization are the most frequently used quality attributes; further, response time, turnaround time, and energy consumption are the most used metrics for quantifying these quality attributes. Moreover, simulation is the main tool used for the assessments, and the studied trade-offs are mainly between only two qualities. Finally, we identified a number of research gaps that need further study.
  •  
5.
  • Chahed, Hamza, et al. (författare)
  • AIDA—Aholistic AI-driven networking and processing framework for industrial IoT applications
  • 2023
  • Ingår i: Internet of Things. - : Elsevier. - 2542-6605. ; 22
  • Tidskriftsartikel (refereegranskat)abstract
    • Industry 4.0 is characterized by digitalized production facilities, where a large volume of sensors collect a vast amount of data that is used to increase the sustainability of the production by e.g. optimizing process parameters, reducing machine downtime and material waste, and the like. However, making intelligent data-driven decisions under timeliness constraints requires the integration of time-sensitive networks with reliable data ingestion and processing infrastructure with plug-in support of Machine Learning (ML) pipelines. However, such integration is difficult due to the lack of frameworks that flexibly integrate and program the networking and computing infrastructures, while allowing ML pipelines to ingest the collected data and make trustworthy decisions in real time. In this paper, we present AIDA - a novel holistic AI-driven network and processing framework for reliable data-driven real-time industrial IoT applications. AIDA manages and configures Time-Sensitive networks (TSN) to enable real-time data ingestion into an observable AI-powered edge/cloud continuum. Pluggable and trustworthy ML components that make timely decisions for various industrial IoT applications and the infrastructure itself are an intrinsic part of AIDA. We introduce the AIDA architecture, demonstrate the building blocks of our framework and illustrate it with two use cases. 
  •  
6.
  • Chatterjee, Ayan, et al. (författare)
  • IoT anomaly detection methods and applications : A survey
  • 2022
  • Ingår i: Internet of Things. - : Elsevier. - 2542-6605. ; 19
  • Forskningsöversikt (refereegranskat)abstract
    • Ongoing research on anomaly detection for the Internet of Things (IoT) is a rapidly expanding field. This growth necessitates an examination of application trends and current gaps. The vast majority of those publications are in areas such as network and infrastructure security, sensor monitoring, smart home, and smart city applications and are extending into even more sectors. Recent advancements in the field have increased the necessity to study the many IoT anomaly detection applications. This paper begins with a summary of the detection methods and applications, accompanied by a discussion of the categorization of IoT anomaly detection algorithms. We then discuss the current publications to identify distinct application domains, examining papers chosen based on our search criteria. The survey considers 64 papers among recent publications published between January 2019 and July 2021. In recent publications, we observed a shortage of IoT anomaly detection methodologies, for example, when dealing with the integration of systems with various sensors, data and concept drifts, and data augmentation where there is a shortage of Ground Truth data. Finally, we discuss the present such challenges and offer new perspectives where further research is required.
  •  
7.
  • Douha, N'guessan Yves-Roland, et al. (författare)
  • A survey on blockchain, SDN and NFV for the smart-home security
  • 2022
  • Ingår i: Internet of Things. - : Elsevier. - 2542-6605. ; 20
  • Forskningsöversikt (refereegranskat)abstract
    • Due to millions of loosely coupled devices, the smart-home security is gaining the attention of industry professionals, attackers, and academic researchers. The smart home is a typical home where many sensors, actuators, and IoT devices are used to automate home users’ daily activities. Although a smart home provides comfort, safety, and satisfaction to users, it opens up multiple challenging security issues when automating and offering intelligent services. Recent studies have investigated not only blockchain but SDN and NFV to address these challenges. We present a comprehensive survey on blockchain, SDN, and NFV for smart-home security. The paper also proposes a new architecture of the smart-home security. First, we describe the features of the smart home and its current security issues. Next, we outline the characteristics of blockchain, SDN, and NFV, including their contribution to improving the smart-home security. While SDN enhances the management and access control of the home network by providing a programmable controller to home nodes, NFV implements the functions of network appliances (e.g., network monitoring, firewall) as virtual machines and ensures the high availability of the network. Blockchain reinforces IoT data's privacy, integrity, and security and improves the trust in transactions among untrusted IoT devices. Finally, we discuss open issues and challenges in the field and propose recommendations towards high-level security for the smart home.
  •  
8.
  • Firouzi, Ramin, 1992-, et al. (författare)
  • Delay-Sensitive Resource Allocation for IoT Systems in 5G O-RAN Networks
  • 2024
  • Ingår i: Internet of Things. - 2542-6605. ; 26
  • Tidskriftsartikel (refereegranskat)abstract
    • The rapid advancement in sensors and communications has led to the expansion of the Internet of Things (IoT) services, where many devices need access to the transport network using fixed or wireless access technologies and mobile Radio Access Networks (RAN). However, supporting IoT in RAN is challenging as IoT services may produce many short and variable sessions, impacting the performance of mobile users sharing the same RAN. To address this issue, network slicing is a promising solution to support heterogeneous service segments sharing the same RAN, which is a crucial requirement of the upcoming fifth-generation (5G) mobile network. This paper proposes a two-level network slicing mechanism for enhanced mobile broadband (eMBB) and Ultra-Reliable and Low Latency communications (URLLC) in order to provide end-to-end slicing at the core and edge of the network with the aim of reducing latency for IoT services and mobile users sharing the same core and RAN using the O-RAN architecture. The problem is modeled at both levels as a Markov decision process (MDP) and solved using hierarchical reinforcement learning. At a high level, an SDN controller using an agent that has been trained by a Double Deep Q-network (DDQN) allocates radio resources to gNodeBs (next-generation NodeB, a 5G base station) based on the requirements of eMBB and URLLC services. At a low level, each gNodeB using an agent that has been trained by a DDQN allocates its pre-allocated resources to its end-users. The proposed approach has been demonstrated and validated through a real testbed. Notably, it surpasses the prevalent approaches in terms of end-to-end latency.
  •  
9.
  • Gunnarsson, Martin, et al. (författare)
  • Evaluating the performance of the OSCORE security protocol in constrained IoT environments
  • 2021
  • Ingår i: Internet of Things. - : Elsevier BV. - 2542-6605. ; 13
  • Tidskriftsartikel (refereegranskat)abstract
    • The Constrained Application Protocol (CoAP) is a standard communication protocol for resource-constrained devices in the Internet of Things (IoT). Many IoT deployments require proxies to support asynchronous communication between edge devices and the back-end. This allows (non-trusted) proxies to access sensitive parts of CoAP messages. Object Security for Constrained RESTful Environments (OSCORE) is a recent standard protocol that provides end-to-end security for CoAP messages at the application layer. Unlike the commonly used standard Datagram Transport Layer Security (DTLS), OSCORE efficiently provides selective integrity protection and encryption on different parts of CoAP messages. Thus, OSCORE enables end-to-end security through intermediary (non-trusted) proxies, while still allowing them to perform their expected services, with considerable security and privacy improvements.To assess whether these security features consume too much of the limited resources available on a constrained device, we have implemented OSCORE (the implementation is available as open-source), and evaluated its efficiency. This paper provides a comprehensive, comparative and experimental performance evaluation of OSCORE on real resource-constrained IoT devices, using the operating system Contiki-NG as IoT software platform. In particular, we experimentally evaluated the efficiency of our OSCORE implementation on resource-constrained devices running Contiki-NG, in comparison with the DTLS implementation TinyDTLS maintained by the Eclipse Foundation. The evaluation results show that our OSCORE implementation displays moderately better performance than TinyDTLS, in terms of per-message network overhead, memory usage, message round-trip time and energy efficiency, thus providing the security improvements of OSCORE with no additional performance penalty.
  •  
10.
  • Klima, Matej, et al. (författare)
  • Specialized path-based technique to test Internet of Things system functionality under limited network connectivity
  • 2023
  • Ingår i: Internet of Things. - : Elsevier. - 2542-6605. ; 22
  • Tidskriftsartikel (refereegranskat)abstract
    • Contemporary Internet-of-Things (IoT) systems are hindered by several reliability-related issues, especially, the dynamic behavior of IoT systems caused by limited and often unstable network connectivity. Several intuitive ad-hoc approaches can be employed to test this behavior; however, the effectiveness of these approaches in detecting defects and their overall testing costs remain questionable. Therefore, we present a new specialized path-based technique to test the processes of an IoT system in scenarios wherein parts of these processes are influenced by limited or disrupted network connectivity. The proposed technique can be scaled using two levels of test coverage criteria to determine the strengths of the test cases. For this purpose, we propose two algorithms for generating test cases to implement the technique: an ant colony optimization-based search and a graph-traversal-based test case composition. We compared the efficiency of the proposed approach with possible solutions obtained using a standard path-based testing approach based on prime paths computed by a set-covering algorithm. We consider the total number of test case steps as the main proxy for test effort in experiments employing 150 problem models. For the less intensive of the two used test-coverage criteria, EachBorderOnce, an ant colony optimization-based algorithm, produced test sets with the same averaged number of steps as the graph traversal-based test-case composition; however, this algorithm performed with averaged number of steps 10% lower than a prime paths-based algorithm. For the more intensive test coverage criterion, AllBorderCombinations, these differences favoring the ant colony optimization-based algorithm were 18% and 25%, respectively. For these two types of defined test coverage criteria, the ant colony optimization-based search, graph-traversal-based algorithm, and standard path-based testing approach based on prime paths achieved the best results for 93 and 78, 14 and 24, and 13 and 17 models for AllBorderCombinations and EachBorderOnce criterion, respectively. Therefore, to guarantee the best test set, all compared algorithms are combined in a portfolio strategy that yields the best results based on the potential of the produced test sets to detect simulated defects caused by limited network connectivity. Additionally, this portfolio strategy also yields test sets, implying the lowest test effort for experimental problem instances. 
  •  
Skapa referenser, mejla, bekava och länka
  • Resultat 1-10 av 20
Typ av publikation
tidskriftsartikel (14)
forskningsöversikt (6)
Typ av innehåll
refereegranskat (20)
Författare/redaktör
Ahmed, Bestoun S., 1 ... (3)
Spalazzese, Romina (3)
Davidsson, Paul (2)
Bhuyan, Monowar H. (2)
Sodhro, Ali Hassan (2)
Alkhabbas, Fahed (2)
visa fler...
Trivedi, A. (1)
Awad, Ali Ismail (1)
Ashjaei, Seyed Moham ... (1)
Mihailescu, Radu-Cas ... (1)
Kassler, Andreas, 19 ... (1)
Taheri, Javid (1)
Nikolakopoulos, Geor ... (1)
Usman, Muhammad (1)
Imran, Ali Shariq (1)
Kastrati, Zenun, 198 ... (1)
Daudpota, Sher Muham ... (1)
Bures, Miroslav (1)
Ali, N. (1)
Al-Dulaimy, Auday (1)
Papadopoulos, Alessa ... (1)
Jansen, M. (1)
Johansson, Bjarne (1)
Iosup, A. (1)
Galletta, A. (1)
Kimovski, D. (1)
Prodan, R. (1)
Tserpes, K. (1)
Kousiouris, G. (1)
Giannakos, C. (1)
Brandic, I. (1)
Bondi, A. B. (1)
Rahmani, Rahim, 1963 ... (1)
Brunstrom, Anna, 196 ... (1)
Elmroth, Erik (1)
Cerioli, Maura (1)
Leotta, Maurizio (1)
Reggio, Gianna (1)
Patriksson, Michael, ... (1)
Payberah, Amir H., 1 ... (1)
Donta, Praveen Kumar ... (1)
Tiloca, Marco (1)
Sahoo, Kshira Sagar (1)
Taenaka, Yuzo (1)
Kadobayashi, Youki (1)
Asadi Bagloee, Saeed (1)
Tavana, Madjid (1)
Withers, Glenn (1)
Asadi, Mohsen (1)
Ashouri, Majid (1)
visa färre...
Lärosäte
Malmö universitet (4)
Umeå universitet (3)
Karlstads universitet (3)
Kungliga Tekniska Högskolan (2)
Stockholms universitet (2)
Högskolan Kristianstad (1)
visa fler...
Luleå tekniska universitet (1)
Mälardalens universitet (1)
Linköpings universitet (1)
Lunds universitet (1)
Chalmers tekniska högskola (1)
Linnéuniversitetet (1)
RISE (1)
visa färre...
Språk
Engelska (20)
Forskningsämne (UKÄ/SCB)
Naturvetenskap (13)
Teknik (7)

År

Kungliga biblioteket hanterar dina personuppgifter i enlighet med EU:s dataskyddsförordning (2018), GDPR. Läs mer om hur det funkar här.
Så här hanterar KB dina uppgifter vid användning av denna tjänst.

 
pil uppåt Stäng

Kopiera och spara länken för att återkomma till aktuell vy