Table 2 - uploaded by Lei Hang
Content may be subject to copyright.
Source publication
Recently, the number of connected smart objects will radically increase in IoT(Internet of things) landscape. The emerging need for cross-domain IoT applications and services highlights the necessity of interoperability across IoT platforms is a big challenge for the development trend of the internet of things. This paper present IoT interworking a...
Context in source publication
Similar publications
The term Internet of Things (IoT) is used as an umbrella that covers several topics, related to the application of technological means to monitor, measure and act upon the environment. As a result, it is difficult to determine a univocal architecture to identify as a reference and several scenarios, involving different sensors, smart devices, netwo...
Internet of Things (IoT) referred to interconnected the world of things like physical devices, cars, sensors, home appliances, actuators and machines embedded with software at any time, any location. The increasing number of IoT devices facing challenges which are registration, integration, describing sensor, interoperability, semantics, security,...
Interoperability and easier migration between offered serviced are aims that can be supported by cloud service brokerage in the cloud service ecosystem. We present here a multi-cloud storage broker, implemented as an API. This API allows objects and collections of objects to be stored and retrieved uniformly across a range of cloud-based storage pr...
With the emergence of the Internet of Things (IoT), application developers can rely on a variety of protocols and Application Programming Interfaces (APIs) to support data exchange between IoT devices. However, this may result in highly heterogeneous IoT interactions in terms of both functional and non-functional semantics. To map between heterogen...
Games are increasingly being recognized as valuable tools for learning. In addition, they are also being explored for their potential to provide valid and reliable assessments, as they allow to create authentic and engaging assessment contexts through interactive and immersive environments. However, there are challenges to enable Game-based Assessm...
Citations
... Mobius platform uses MYSQL DBMS for storing its resources. Mobius is developed based on Node JS using JavaScript and support HTTP/MQTT protocols [5]. ...
... Mobius platform uses MYSQL DBMS for storing its resources. Mobius is developed based on Node JS using JavaScript and support HTTP/MQTT protocols [5]. ...
Wireless Sensor Network is several sensor nodes
that form a network capable of communicating with each other
wirelessly. Data mining is useful for finding a pattern from a
large amount of data, for driving condition monitoring can be
obtained through Controller Area Network (CAN)-bus data.
Vehicle sensors for this research provide signal data, including
wheel speed and GPS data. Random Forest is used for this
project because of it easy to use and understand. Random
Forest Classification is one of the popular methods of data
mining. Sensors, applications, and users who want access the
vehicle information are integrated to communicate with each
other using Mobius IoT platform. The accuracy of Random
Forest Classifier obtained through this research is 80.9%.
The abstract should summarize the contents of the paper in short terms, i.e. 150–250 words. Automation in sensor-based network has made Internet of Things (IoTs) a reality. From wearable gadgets, smart homes, smart city, industrial internet, connected car, connected health, smart retail down to smart farming, IoT plays a major role at present. This drastic development now met with security issues such as privacy, infrastructure, leakage of information, loss of security services etc and is a major challenges. In this communication, we have surveyed literature to understand various security issues of IoT and the immediate challenges to be addressed to overcome security issues. Different factors like mobility, scalability, resource limitation etc. are considered for analyzing IoT security and current researchers can identify some open research problems and meet the challenges to promote IoT further.