Open Access   Article Go Back

A Vision of Internet of Things

S. Sabeena1 , M. Jaganathan2

Section:Review Paper, Product Type: Journal Paper
Volume-7 , Issue-2 , Page no. 492-497, Feb-2019

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v7i2.492497

Online published on Feb 28, 2019

Copyright © S. Sabeena, M. Jaganathan . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: S. Sabeena, M. Jaganathan, “A Vision of Internet of Things,” International Journal of Computer Sciences and Engineering, Vol.7, Issue.2, pp.492-497, 2019.

MLA Style Citation: S. Sabeena, M. Jaganathan "A Vision of Internet of Things." International Journal of Computer Sciences and Engineering 7.2 (2019): 492-497.

APA Style Citation: S. Sabeena, M. Jaganathan, (2019). A Vision of Internet of Things. International Journal of Computer Sciences and Engineering, 7(2), 492-497.

BibTex Style Citation:
@article{Sabeena_2019,
author = {S. Sabeena, M. Jaganathan},
title = {A Vision of Internet of Things},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {2 2019},
volume = {7},
Issue = {2},
month = {2},
year = {2019},
issn = {2347-2693},
pages = {492-497},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=3693},
doi = {https://doi.org/10.26438/ijcse/v7i2.492497}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v7i2.492497}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=3693
TI - A Vision of Internet of Things
T2 - International Journal of Computer Sciences and Engineering
AU - S. Sabeena, M. Jaganathan
PY - 2019
DA - 2019/02/28
PB - IJCSE, Indore, INDIA
SP - 492-497
IS - 2
VL - 7
SN - 2347-2693
ER -

VIEWS PDF XML
313 175 downloads 98 downloads
  
  
           

Abstract

The Internet of Things (IoT’s) fast growth is affected by resource use and fears regarding privacy and security. An answer put together addressing security, efficiency, privacy, and measurability is required to support continued growth. We have a tendency to propose an answer shapely on human use of context and data, lever-aging cloud resources to facilitate IoT on affected devices. We have a tendency to applying method information to provide security through abstraction and privacy through remote data fusion. We have a tendency to define the components and contemplate the key ideas of the “data proxy” and the “cognitive layer.” The information proxy uses system models to digitally mirror objects with lowest input information, whereas the cognitive layer applies these models to monitor the system’s evolution and to simulate the impact of commands before execution. The data proxy permits a system’s sensors to be sampled to fulfill a such quality of information target with lowest resource use.

Key-Words / Index Term

Emerging technologies, Internet of Things (IoT), networking architecture

References

[1] C. Perera, A. Zaslavsky, P. Christen, and D. Georgakopoulos, “Context aware computing for the Internet of Things: A survey,” IEEE Commun. Surveys Tuts., vol. 16, no. 1, pp. 414–454, 1st Quart., 2014.
[2] J. Gubbi, R. Buyya, S. Marusic, and M. Palaniswami, “Internet
of Things (IoT): A vision, architectural elements, and future direc- tions,” Future Gener. Comput. Syst., vol. 29, no. 7, pp. 1645–1660,
2013. [Online]. Available: http://www.sciencedirect.com/science/article/
pii/S0167739X13000241
[3] L. Atzori, A. Iera, and G. Morabito, “The Internet of Things: A survey,”
Comput. Netw., vol. 54, no. 15, pp. 2787–2805, Oct. 2010.
[4] C. C. Aggarwal, N. Ashish, and A. Sheth, The Internet of Things: A Survey From the Data-Centric Perspective. Boston, MA, USA: Springer,
2013, pp. 383–428, doi: 10.1007/978-1-4614-6309-2_12.
[5] K. Bhaduri and M. Stolpe, Distributed Data Mining in Sensor Networks. Boston, MA, USA: Springer, 2013, pp. 211–236, doi: 10.1007/978-1-4614-6309-2_8.
[6] S. Wang, J. Wan, D. Li, and C. Zhang, “Implementing smart factory of industrie 4.0: An outlook,” Int. J. Distrib. Sensor Netw., vol. 12, no. 1, p. 7, 2016, doi: 10.1155/2016/3159805.
[7] J. E. Siegel, “Data proxies, the cognitive layer, and application locality: Enablers of cloud-connected vehicles and next-generation Internet of Things,” Ph.D. dissertation, Dept. Mech. Eng., Massachusetts Inst. Technol., Cambridge, MA, USA, Jun. 2016. [Online]. Available: http://hdl.handle.net/1721.1/104456
[8] V. Chang and M. Ramachandran, “Towards achieving data security with the cloud computing adoption framework,” IEEE Trans. Services Comput., vol. 9, no. 1, pp. 138–151, Jan./Feb. 2016.
[9] L. Li, M. Rong, and G. Zhang, “An Internet of Things QoE evalua- tion method based on multiple linear regression analysis,” in Proc. 10th Int. Conf. Comput. Sci. Educ. (ICCSE), Cambridge, U.K., Jul. 2015, pp. 925–928.
[10] E. Wilhelm et al., “Cloudthink: A scalable secure platform for mir- roring transportation systems in the cloud,” Transport, vol. 30, no. 3, pp. 320–329, 2015.
[11] S. Mayer and J. Siegel, “Conversations with connected vehicles,” in Proc. 5th Int. Conf. Internet Things (IoT), Seoul, South Korea, Oct. 2015, pp. 38–44.
[12] O. Arias, J. Wurm, K. Hoang, and Y. Jin, “Privacy and security in
Internet of Things and wearable devices,” IEEE Trans. Multi Scale
Comput. Syst., vol. 1, no. 2, pp. 99–109, Apr./Jun. 2015.
[13] M.-H. Maras, “Internet of Things: Security and privacy implications,”
Int. Data Privacy Law, vol. 5, no. 2, pp. 99–104, 2015.
[14] S. Notra, M. Siddiqi, H. H. Gharakheili, V. Sivaraman, and R. Boreli, “An experimental study of security and privacy risks with emerging household appliances,” in Proc. IEEE Conf. Commun. Netw. Security, San Francisco, CA, USA, Oct. 2014, pp. 79–84.