the internet of things (IoT) paradigm comprises a heterogenous mix of connected devices connected to the internet. this promises a a wealth of opportunity for a large collection of distributed applications and service...
详细信息
the internet of things (IoT) paradigm comprises a heterogenous mix of connected devices connected to the internet. this promises a a wealth of opportunity for a large collection of distributed applications and services. However, the IoT introduces significant changes to the internet model, largely in the form of billions to trillions of embedded devices that most likely will not be able to be managed centrally by cloud services due to lack of scalability. We suggest that the natural direction for IoT devices is to manage themselves, both in terms of their software/hardware configuration and their resource utilization. In this work, we describe the underlying framework for self-managing devices, comprising measurement-based learning and adaptation to changing system context and application demands. In addition, we describe several upcoming research challenges in order to realize this self-management vision.
Cloud computing and digital forensics are both developing topics and researching these topics requires an understanding of the main aspects of both cloud computing and digital forensics. In cloud computing it is neces...
详细信息
Cloud computing and digital forensics are both developing topics and researching these topics requires an understanding of the main aspects of both cloud computing and digital forensics. In cloud computing it is necessary not only to understand its characteristics and the different services and deployment models but also to survey the underpinning elements of cloud computing such as virtualization and the distributedcomputing which are important to identify its impact on current digital forensics guidelines and procedures. Unlike papers discussing the challenges and opportunities presented by cloud computing in relation to digital forensics, in this paper, we will discuss the underpinning cloud computing elements which are required to provide forensics friendly cloud services. Furthermore, we suggest a set of questions that will aid in the process of cloud forensics analysis.
Linking the physical world to the internet, also known as the internet of things, has increased available information and services in everyday life and in the Enterprise world. In Enterprise IT an increasing number of...
详细信息
ISBN:
(纸本)9781467324793
Linking the physical world to the internet, also known as the internet of things, has increased available information and services in everyday life and in the Enterprise world. In Enterprise IT an increasing number of communication is done between IT backend systems and small IoT devices, for example sensor networks or RFID readers. this introduces some challenges in terms of complexity and integration. We are working on the integration of IoT devices into Enterprise IT by leveraging SOA techniques and Semantic Web technologies. We present a SOA based integration platform for connecting WSNs and large enterprise business processes. For ensuring interoperability our platform is based on Linked Services. these are thoroughly described, machine-readable, machine-reasonable service descriptions.
Because the broad application prospects of internet of things (IoT) and the progress of short-range wireless technology, the internet and the intelligent terminals have an explosive growth, IoT is expected to become t...
详细信息
Because the broad application prospects of internet of things (IoT) and the progress of short-range wireless technology, the internet and the intelligent terminals have an explosive growth, IoT is expected to become the next trillion-dollar information industry. In wired/wireless technologies, the machine to machine (M2M) communications have higher request to benefit people, include e-health, family energy management and entertainment. this paper represents technical indexes, application range, radio coexistence mechanism and suitable network standards of key radio technologies. In the application layer, this paper argues the cloud computingtechnology as the center to help process a large amount of data of the sensing layer, for providing efficient services to clients and effectively reducing the cost of smart home withthe help of data processing.
the modern distributed systems introduce new constraints. therefore, there are subject to different types of faults. A running application should proceed normally and especially end to achieve its goals despite the pr...
详细信息
ISBN:
(纸本)9781467324793
the modern distributed systems introduce new constraints. therefore, there are subject to different types of faults. A running application should proceed normally and especially end to achieve its goals despite the presence of faults. Hence, the fault tolerance is very important in this context. Among the fault tolerance techniques, we consider in this study, the checkpointing based recovery by proposing a new hybrid checkpointing protocol for MANETs.
Similarly to co-located software engineering teams, teams in which developers work geographically distributed require a variety of information about the project, organization and team members to collaborate effectivel...
详细信息
Similarly to co-located software engineering teams, teams in which developers work geographically distributed require a variety of information about the project, organization and team members to collaborate effectively. However, in such a setting, maintaining awareness at a sufficient level to collaborate optimally is generally more difficult. therefore research has been done on the prioritization of information for distributed software engineers, based on their current activity and status. Based on this research a platform was developed incorporating a subset of the findings. In this paper we report on a first evaluation of the deployment of this platform in a distributed industrial case setting. the most important findings are that: (i) providing distributed software engineers withtheir information needs, appears to contribute to an increase in their overall level of awareness and (ii) information about project related communication withthe customer and information about the happiness of colleagues adds the most value.
User interests and behavior will play a key role in the design of future mobile networks. In this paper, we introduce a novel technique for the modeling of mobile users interests based on their online activity and mob...
详细信息
ISBN:
(纸本)9781467324793
User interests and behavior will play a key role in the design of future mobile networks. In this paper, we introduce a novel technique for the modeling of mobile users interests based on their online activity and mobility. In this study, we conduct domain-specific and location-based analysis and modeling of mobile user interests based on the amount of their online time. Using KS test, we show that domain-specific and location-based models provide more accuracy than a generic model for mobile users interests. the provided models can be applied for design and evaluation of a myriad of interest-based applications and services for future mobile global internet.
Minimizing the energy consumption of battery-powered sensors is an essential consideration in sensor network applications like coverage, and sleep/wake scheduling mechanism has been proved to an efficient approach to ...
详细信息
Minimizing the energy consumption of battery-powered sensors is an essential consideration in sensor network applications like coverage, and sleep/wake scheduling mechanism has been proved to an efficient approach to handling this issue. Nevertheless, the frequent switching between states, during scheduling, leads also to significant energy consumption. In this article, a coverage-guaranteed distributed sleep/wake scheduling scheme is presented withthe purpose of prolonging network lifetime while guaranteeing network coverage. Our scheme mitigates scheduling process to be more stable by avoiding useless transitions between states without affecting the coverage level required by the application. the simulation results illustrate that out scheme outperforms some other existed algorithms in terms of coverage guarantee, energy conservation and stability.
Smart objects connected to the internet, constituting the so called internet of things (IoT), are revolutionizing human beings9; interaction withthe world. As technology reaches everywhere, anyone can misuse it, a...
详细信息
Smart objects connected to the internet, constituting the so called internet of things (IoT), are revolutionizing human beings' interaction withthe world. As technology reaches everywhere, anyone can misuse it, and it is always essential to secure it. In this work we present a denial-of-service (DoS) detection architecture for 6LoWPAN, the standard protocol designed by IETF as an adaptation layer for low-power lossy networks enabling low-power devices to communicate withthe internet. the proposed architecture integrates an intrusion detection system (IDS) into the network framework developed within the EU FP7 project ebbits. the aim is to detect DoS attacks based on 6LoWPAN. In order to evaluate the performance of the proposed architecture, preliminary implementation was completed and tested against a real DoS attack using a penetration testing system. the paper concludes withthe related results proving to be successful in detecting DoS attacks on 6LoWPAN. Further, extending the IDS could lead to detect more complex attacks on 6LoWPAN.
暂无评论