Figure - uploaded by Bardia Safaei
Content may be subject to copyright.
Estimated Number of Connected Devices Per Person By 2025

Estimated Number of Connected Devices Per Person By 2025

Source publication
Conference Paper
Full-text available
With the widespread use of IoT devices in safety-critical applications, new constraints should be addressed in designing IoT infrastructures. Reliability is one of the most important characteristics of an IoT system which should be satisfied with high consideration. The way how IoT devices communicate with each other in different layers of architec...

Similar publications

Article
Full-text available
This journal present Real time bus location using WSN and Internet of things. Bus user appealed to get bus arrival at the right time, but until now the shuttle bus service in most countries only provide a timetable and most of the time it is unreliable. In this project, the system is designed to provide real-time location, latest bus stop checkpoin...

Citations

... In fog computing networks, the communication protocol commonly used for conducting task offloading is the Message Queuing Telemetry Transport (MQTT) protocol. MQTT is a lightweight, publish-subscribe messaging protocol that is well-suited for establishing efficient and reliable communications between devices in IoT and fog computing environments [52]. ...
Article
Full-text available
While the Guarantee Ratio (GR) is critically important in delay-sensitive fog applications, the existing deadline-aware task assignment strategies prioritize the balance of utilization over this criterion. Therefore, this paper introduces FUSION: a fuzzy-based task management policy, which provides a high GR with the least possible makespan. FUSION considers the effect of propagation, uplink/downlink delays, and also the bandwidth between the layers on the tasks’ completion time during offloading. It benefits from a fuzzy offloader, along with a VM-ranking strategy based on a fuzzy quantified proposition. Hence, it uses two simple and efficient fuzzy ranking approaches, i.e., Decomposition and OWA. By employing fuzzy-based models, FUSION can handle uncertainty in rapidly changing fog environments with time-varying task sets with minimal computation complexity against existing meta-heuristic algorithms. FUSION considers tasks’ size with respect to VM’s processing capacity (MIPS), arrival rate, length, deadline, processing time, and execution time. In addition to VMs’ load, and busy time, FUSION considers laxity as one of its VM-ranking objectives. FUSION also conducts load-balancing, but only when it can improve the rankings to not affect the GR. Based on the iFogSim simulations, FUSION provides a higher GR in 63% of the scenarios compared to state-of-the-art. Furthermore, evaluations of the offloader algorithm indicate that FUSION provides higher GR in more than 55% of the scenarios.
... The average household will be steadily transitioning to becoming "smart homes", where traditional appliances such as refrigerators, microwave ovens, thermostats etc., will be Internet enabled, allowing the consumer to access and control them from anywhere. Software platforms for IoT like Samsung SmartThings [2] and Google Nest [3] is expected to drive this growth even further, where the total number of Internet connected "Things" is expected to be around 75 billion by 2025 [4]. Amidst this race to adopt and integrate smart devices into homes and businesses, attacks against such devices have also been on the rise [5], [6] [7]. ...
Conference Paper
Full-text available
The Internet of Things (IoT) paradigm refers to a system of billions of Internet-enabled smart devices interconnected with each other. This study attempts to evaluate access control restrictions in smart devices through a penetration test of a lightweight IoT device such as a smartbulb. Very often, lightweight firmware for such devices become the foundation for other products in the market, and requires careful scrutiny for security weaknesses. Past research has discovered several vulnerabilities in a variety of products linked to the vendor of our study. Hence, this study is also interested in the status quo of security updates to newer products given the knowledge of past vulnerabilities. Based on our 3-stage penetration testing approach, we have discovered several access control violations where an attacker can gain network credentials, cloud service credentials of the operator and create availability issues via denial-of-service attacks. Consumers need to be aware of such vulnerabilities that could lead to the compromise of their organizational security countermeasures since weak access control checks on these devices could make them the weak links in the cyber defense chain. Stricter regulations should also be mandated by all stakeholders to ensure that the IoT ecosystem flourishes and benefits society without compromising the security aspect of networked technology systems.
... : ETX refers to the minimum number of packets expected to be sent to a specific destination node until a packet is successfully delivered [24]. The value of ETX is obtained based on Equations (6), and (7), respectively [12], [45]. According to Equation (6), ET X old indicates the previous value of the link quality between a node and its neighboring node, and β is the learning factor. ...
Article
Full-text available
Resource-limited mobile IoT networks are a dynamic, and uncertain wireless communicating system. In such systems, the standard RPL routing protocol cannot select long-lasting communication links due to not employing mobility-aware metrics, e.g., direction and speed of movements. While several classical heuristic approaches exist to improve PDR in RPL-based mobile networks, their solutions cannot adapt to alterations of the mobile topology. Hence, in this paper, by mapping the routing problem in mobile and resource-limited networks into an infinite-time horizon MDP, an energy-aware and reliable RPL-based routing mechanism based on Q-learning is proposed to improve PDR in mobile IoT networks. This routing mechanism, which is called QUERA, utilizes mobility and quality-aware metrics, including Time-to-Reside (TTR), ETX, and RSSI. Furthermore, QUERA probes and maintains stable candidates based on its neighbor table management policy. These two aspects mitigate the need for retransmissions due to packet loss leading to less energy dissipation. According to evaluations, QUERA improves energy consumption by up to 50% against the state-of-the-art. The efficiency of QUERA is also evaluated in terms of power distribution diagram, which shows significant improvement in the lifetime of IoT devices. It has also been observed that QUERA improves PDR in mobile networks by up to 12%.
... MANETs can also be useful in situations where the construction phase is challenging, making them an attractive option for various applications. For example, MANETs can assist in deploying and coordinating drones on the battlefield [27]. ...
Article
Full-text available
A Mobile Ad Hoc Network (MANET) is a self-organize assemblage of mobile nodes without the use of pre-existing infrastructure. They face challenges of security, routing efficiency, and network stability due to dynamic topology and limited resources. The Black Hole Attack on MANETs is a critical concern, affecting communication reliability. This malicious activity involves a node falsely advertising the shortest route to the destination, leading data packets to be routed into a “black hole” where they are dropped and causing severe disruptions. This research focuses on the Ad Hoc On-Demand Multi-Path Distance Vector Routing (AOMDV) protocol, which is preferred for its improved efficiency compared to a single-path routing protocol in MANETs. We observe, investigate, and estimate wireless ad-hoc network route optimization by reducing packet hops between nodes. We suggested a novel strategy in this paper, the K-AOMDV protocol that uses K-means clustering to prevent routing misbehavior. The efficiency of the proposed K-AOMDV (KNN-Ad-hoc on demand multi-path distance vector) routing protocol is calculated using supervised machine learning approach to predict optimal routes with delay and attacks. By employing multiple paths and dynamic route discovery, it ensures robust data delivery even in the presence of malicious nodes. This protocol’s adaptability and multi-path nature effectively minimize the effects of Black Hole Attacks, bolstering the MANETs security. Proposed algorithm has a high accuracy rate of 0.99%, 80% true positives, and 80% recall.
... Table 2 provides a list of the parameters used for trust evaluation. The reliability of the objects which are not under trusted SIoT relationship are evaluated based on (1) direct trust, (2) indirect trust, or (3) recommendation trust. Overall trust evaluation consists of three components as trust value of the object itself (α), trust value given by other objects directly (β), and the trust value through recommendation (γ). ...
... I G U R E 1 Estimated number of connected devices per person by 2025[2]. ...
Article
Full-text available
Internet of Things (IoT) and wireless communication technologies are evolving rapidly and changing the way we live and work. IoT devices may need to share personal information over the public network taking the help of nearby devices. Thus, the trustworthiness of nearby devices shall play an essential role in providing security and privacy assurance. The authors proposed an autonomous decentralised trust management model for selecting a trustworthy device for a requested service transaction. The proposed scheme uses the Social Internet of Things for trust management. The proposed model uses social relationships to find the level of trust among related devices, estimate the overall trust of the unknown devices, periodically update the observed trust values, and isolate the malicious nodes in the network. The evaluated trust values are updated in the network frequently so that other devices can utilise the information later. The periodic update can increase performance and detect trust‐related malicious attacks. The simulation result shows that the performance of the proposed model is better as compared to existing trust management models. The proposed model can detect malicious objects at an early stage and can handle malicious attacks by isolating malicious devices.
... interconnected over the internet, mobile networks have become an essential part of people's daily lives [2]. The number of mobile devices per person has grown exponentially, with an estimated 5.22 billion unique mobile users worldwide [3], whose use ranges from traditional telephony and messaging to educational and entertainment purposes (e.g., audio and video streaming). ...
Article
Full-text available
Numerical evaluation and/or measurement campaigns are currently the only means of evaluating the isolation between antennas; in the former case, the simulation time and computational resources necessary can be burdensome, whereas the latter requires several weeks of work to be completed. Within this context, this article aims at presenting an effective methodology for the evaluation of the isolation between co-located antennas in a rapid computational time. The proposed method is based on the near-field equivalent representation of real antennas ( Tx and Rx ) combined with the ray tracing method for evaluating the field re-radiated by the source antenna on the receiver, hence the received power. The procedure is general and suitable to any type of antenna with any configuration and number of radiation elements. Moreover, antenna mechanical and electrical details are not needed, since only near field information is needed. Finally, it considers the presence of the support structure and surrounding obstacles. The methodology has been validated by full-wave simulations and measurements, yielding consistent and accurate results with an error that is below 2 dB in most of the cases, up to 6 dB for very low coupling values, indicating a high level of accuracy and reliability.
... Intelligent devices able to capture, gather, process, and distribute information have become a necessity for an ever-increasing number of domains, ranging from the simplistic use of smart home gadgets to the highly critical medical sector. Intelligent devices have become such an integral part of contemporary society, which each human is estimated to own 9.3 devices, by the year of 2025 [1]. Such a massive number of data-driven devices is expected to significantly increase the volume of data to be processed and stored. ...
Chapter
Full-text available
The centralization of data is a current practice in information systems that do not fit into the novel next-generation computing concept. Such a paradigm aims to support the distribution of information, processing, and computing power. Blockchain is a technology supporting the recording of information for distributed and decentralized, peer-to-peer applications, which has emerged in the last decade, with the initial focus being on the finance sector. A highly valuable feature of blockchain is its capability of enhancing the security of data due to the immutability of the information stored on the ledger. In this chapter, the definition, details, applications, and benefits of this technology will be explored. In addition, the ways in which blockchain increases security and privacy will be described. Finally, the pairing of blockchain with other next-generation, cutting-edge technologies will be investigated.
... As a result, several application layer protocols have been developed to support communication in IoT networks, each with a unique and problem-specific communication solution. Various studies have employed a range of methodologies, including experiments [82,83], simulations [84], and testbed implementation [85], to compare the performance of various protocols. These evaluations used several performance metrics such as bandwidth consumption, efficiency, energy consumption, latency, reliability, Round Trip Time (RTT), upload and download time, average response time, and throughput. ...
... The inherent characteristics of reliability, guaranteed packet delivery, and error-checking ensure relevance, which has earned the trust of numerous developers. UDP, on the other hand, offers an effortless 'fire and forget' transmission model which excels in availability due to its connectionless nature and timeliness, making it a suitable choice for use cases like Emergency Vehicle Pre-emption [85] where low overhead and latency are prioritised. In addition, DCCP mirrors UDP's connectionless architecture but further augments it with a built-in congestion control mechanism, making it a promising candidate for streaming media feeds. ...
Article
Full-text available
Networking protocols have undergone significant developments and adaptations to cater for unique communication needs within the IoT paradigm. However, meeting these requirements in the context of vehicle-to-infrastructure (V2I) communications becomes a multidimensional problem due to factors like high mobility, intermittent connectivity, rapidly changing topologies, and an increased number of nodes. Thus, examining these protocols based on their characteristics and comparative analyses from the literature has shown that there is still room for improvement, particularly in ensuring efficiency in V2I interactions. This study aims to investigate the most viable network protocols for V2I communications, focusing on ensuring data quality (DQ) across the first three layers of the IoT protocol stack. This presents an improved understanding of the performance of network protocols in V2I communication. The findings of this paper showed that although each protocol offers unique strengths when evaluated against the identified dimensions of DQ, a cross-layer protocol fusion may be necessary to meet specific DQ dimensions. With the complexities and specific demands of V2I communications, it’s clear that no single protocol from our tri-layered perspective can solely fulfil all IP-based communication requirements given that the V2I communication landscape is teeming with heterogeneity, where a mixture of protocols is required to address unique communication demands.
... In another study, the overheads in IoT systems were examined by comparing the more reliable MQTT and the less reliable CoAP on an Arduino Uno test-bed. The findings indicate that while MQTT provides a more reliable infrastructure, it incurs higher power consumption and latency compared to CoAP [67]. ...
Article
Full-text available
The development of smart city applications often encounters a variety of challenges. These include the need to address complex requirements such as integrating diverse data sources and incorporating geographical data that reflect the physical urban environment. Platforms designed for smart cities hold a pivotal position in materializing these applications, given that they offer a suite of high-level services, which can be repurposed by developers. Although a variety of platforms are available to aid the creation of smart city applications, most fail to couple their services with geographical data, do not offer the ability to execute semantic queries on the available data, and possess restrictions that could impede the development process. This paper introduces SEDIA, a platform for developing smart applications based on diverse data sources, including geographical information, to support a semantically enriched data model for effective data analysis and integration. It also discusses the efficacy of SEDIA in a proof-of-concept smart city application related to air quality monitoring. The platform utilizes ontology classes and properties to semantically annotate collected data, and the Neo4j graph database facilitates the recognition of patterns and relationships within the data. This research also offers empirical data demonstrating the performance evaluation of SEDIA. These contributions collectively advance our understanding of semantically enriched data integration within the realm of smart city applications.
... We could concur that the discontent structure has a certain possibility of appropriation without violating our point of agreement. Examining IoT metrics for accessibility and dependability necessitates considering the characteristics of IoT accessories and equipment [46][47][48][49][50]. The persistence function of "Internet of Things" devices, which are designed to identify and monitor physical objects, was also investigated in this research. ...
... While ROBDDs might not be directly applied in the typical IoT system development or data processing stages, they can still be valuable in certain specialised scenarios involving complex logic and rule-based decision-making [44][45][46][47][48][49][50]. ...
Article
Reliability of Internet of Things seeks out beneficial problems by presenting, resolving, and certifying them. Preparations are essential in addition to offering IoT responsiveness for the huge preparation of advances in the Internet of Things in all domains of society. The purpose of this study is to propose, examine, and explore surveys in planned works and their future rights based on the results of the IoT in this particular case. IoT's fundamental critical components are the usage of repeating devices that maximise the benefits of mobile phones, sensors, as well as actuators. Networking, along with other formula-based assessments, has amplified node-to-node connectivity at different levels in terms of IoT reliability. In the present study work, dependability metrics and models have undergone a rigorous assessment. Evaluation of work analysis and future prospective of different research articles in the detailed view of the reliability of the Internet of Things. A Novel model for reliability technique is being proposed, which qualifies the accuracy, and precision using various machine learning algorithms can be used. The measurement of reliability in the IoT provides several study avenues as a result of this thorough investigation. Despite the sensitive nature of the research field, studies that access models of IoT dependability are now communicating widely.