首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
The role of investors in the growth of startups has been continuously studied. Our paper complements this stream of research by adding a new role of the investor in the Internet of Things (IoT) field, as a channel of knowledge sharing among startups. The relationship between “Internet of Things” startups located in the US and its investors leads to technology convergence as a result of knowledge sharing from investors. Using network analysis and a co-occurrence method, we find that investors in the IoT field play an intermediate role connecting startups by forming an ideal topology for knowledge sharing among them in the IoT industry. IoT startups having investors and more connections to other startups show greater technology convergence. Based on the above findings, this study argues that technology convergence occurs in the venture network as a result of investors playing the role of a channel of knowledge flow.  相似文献   

2.
There is an ongoing enormous expansion of Internet of Things devices and services in everyday life, notably in novel large scale urban environments called Smart Cities. There, availability and uses of Internet of Things by end users and businesses is mainly palpable subject to prior knowledge of the relevant providers and use of dedicated applications that are associated with them. This current reality can be largely ascribed to the property of “verticality” of autonomous Internet of Things eco-systems in Smart Cities, where Internet of Things devices (e.g. sensor nodes) are connected over a communication infrastructure to service-cloud platforms that deliver and process data that is then presented at the applications level. This paper explains possibilities for revolutionary changes needed towards liberalising deployment and visibility of IoT services and data associated with them. It advocates a conceptual approach termed “horizontal networking for Internet of Things” facilitating a more open and generic presence of Internet of Things through the proposed Internet of Things identification meta-data. The vision is built on needed novel practical features in the current communication setups. The features comprise combinations of the opportunistic and near-match search and discovery model, Internet of Things identification meta-data also reflecting the physical and network-based dimensions of devices’ locations, novel routing and data flow models emerging via Information-Centric Networking and changes required in the elements of the current telecommunication infrastructure and the Internet.  相似文献   

3.
Internet of Things (IoT) is playing a more and more important role after its showing up, it covers from traditional equipment to general household objects such as WSNs and RFID. With the great potential of IoT, there come all kinds of challenges. This paper focuses on the security problems among all other challenges. As IoT is built on the basis of the Internet, security problems of the Internet will also show up in IoT. And as IoT contains three layers: perception layer, transportation layer and application layer, this paper will analyze the security problems of each layer separately and try to find new problems and solutions. This paper also analyzes the cross-layer heterogeneous integration issues and security issues in detail and discusses the security issues of IoT as a whole and tries to find solutions to them. In the end, this paper compares security issues between IoT and traditional network, and discusses opening security issues of IoT.  相似文献   

4.
The Internet of Things (IoT) is one of the paradigms related to the evolution of telecommunication networks which is contributing to the evolution of numerous use cases, such as smart city and smart agriculture. However, the current communication infrastructure and wireless communication technologies are not always able to guarantee a proper service for these IoT scenarios. Smart solutions are needed to overcome current terrestrial network limitations offering a cost-effective way to extend the current terrestrial network coverage. For example, temporary extensions “on-request” of the terrestrial infrastructure may be a viable solution to allow collecting data generated by nodes outside the current network coverage. Flying objects can help achieve this goal. Various studies supported the use of unmanned aerial vehicles (UAVs) as intermediate nodes between IoT devices and the network. However, such solutions have not been exhaustively tested yet in real-case scenarios. This paper proposes an efficient solution to collect data from multiple IoT sensors in rural and remote areas based on UAVs. It describes the implementation of the proposed UAV-based Long RangeWide Area Network (LoRaWAN) flying gateway able to collect data directly from LoRaWAN sensors during its flight, keep them stored in an onboard memory, and forward them at the end of its flying path to a platform where the authorized users can access them. A prototype of the gateway has been developed to assess the proposed solution through both indoor and outdoor tests aiming to test its feasibility both in terms of communication performance and UAV-required hardware resources.  相似文献   

5.
Wireless Networks - Internet of Things (IoT) enables the inter-connectivity of different “things” using which wide range of items and devices can communicate with each other and their...  相似文献   

6.
The Internet of Things (IoT) has become a reality with the availability of chatty embedded devices. The huge amount of data generated by things must be analysed with models and technologies of the “Big Data Analytics”, deployed on cloud platforms. The CIRUS project aims to deliver a generic and elastic cloud-based framework for Ubilytics (ubiquitous big data analytics). The CIRUS framework collects and analyses IoT data for Machine to Machine services using Component-off-the-Shelves (COTS) such as IoT gateways, Message brokers or Message-as-a-Service providers and big data analytics platforms deployed and reconfigured dynamically with Roboconf. In this paper, we demonstrate and evaluate the genericity and elasticity of CIRUS with the deployment of a Ubilytics use case using a real dataset based on records originating from a practical source.  相似文献   

7.
To attain ubiquitous connectivity of everything, Internet of Things (IoT) systems must include “multimedia things.” Internet of Multimedia Things (IoMT) is a heterogeneous network of smart multimedia things connected together and with other physical devices to the Internet so as to achieve globally available multimedia services and applications. Due to the ever increasing amount of multimedia data in IoT environments, securing these systems becomes crucial. This is because these systems are easily susceptible to attacks when information or any service is accessed by the users. In this paper, we propose a secure three‐factor remote user authentication scheme for IoMT systems using ECC. The formal security proof performed using ROR model and BAN logic confirms that an attacker will not be able to extract sensitive user information. Through informal security analysis, we justify the resistance of the scheme against several security attacks. The performance comparison shows that the scheme is efficient in terms of computational cost, security features, and attack resistance. Furthermore, simulation of the scheme using AVISPA and Proverif proves that the scheme is secure against all active and passive attacks.  相似文献   

8.
The Internet of Things (IoT) is a network of interconnected smart objects having capabilities that collectively form an ecosystem and enable the delivery of smart services to users. The IoT is providing several benefits into people's lives through the environment. The various applications that are run in the IoT environment offer facilities and services. The most crucial services provided by IoT applications are quick decision for efficient management. Recently, machine learning (ML) techniques have been successfully used to maximize the potential of IoT systems. This paper presents a systematic review of the literature on the integration of ML methods in the IoT. The challenges of IoT systems are split into two categories: fundamental operation and performance. We also look at how ML is assisting in the resolution of fundamental system operation challenges such as security, big data, clustering, routing, and data aggregation.  相似文献   

9.
杨震  赵建军  黄勇军  李洁  陈楠 《电信科学》2022,38(12):27-34
国家战略把人工智能(AI)及物联网(IoT)/5G同时定位为信息基础设施的重要组成部分,其中人工智能属于新技术基础设施,IoT/5G属于通信网络基础设施。这引出了“通信技术与人工智能技术融合发展”的技术方向。对于电信运营商而言,如何将人工智能技术与网络融合,重构网络技术架构,将“AI能力”作为“服务”开放,将是重要的技术演进方向。基于这一命题,探讨了未来AI和网络技术的发展方向,为未来AI技术与IoT/5G网络架构的融合发展方向提供了参考思路。  相似文献   

10.
The phrase Internet of Things (IoT) heralds a vision of the future Internet where connecting physical things, from banknotes to bicycles, through a network will let them take an active part in the Internet, exchanging information about themselves and their surroundings. This will give immediate access to information about the physical world and the objects in it—leading to innovative services and increase in efficiency and productivity. This paper studies the state-of-the-art of IoT and presents the key technological drivers, potential applications, challenges and future research areas in the domain of IoT. IoT definitions from different perspective in academic and industry communities are also discussed and compared. Finally some major issues of future research in IoT are identified and discussed briefly.  相似文献   

11.
The next wave of communication and applications will rely on new services provided by the Internet of Things which is becoming an important aspect in human and machines future. IoT services are a key solution for providing smart environments in homes, buildings, and cities. In the era of massive number of connected things and objects with high growth rate, several challenges have been raised, such as management, aggregation, and storage for big produced data. To address some of these issues, cloud computing emerged to the IoT as Cloud of Things (CoT), which provides virtually unlimited cloud services to enhance the large-scale IoT platforms. There are several factors to be considered in the design and implementation of a CoT platform. One of the most important and challenging problems is the heterogeneity of different objects. This problem can be addressed by deploying a suitable “middleware” which sits between things and applications as a reliable platform for communication among things with different interfaces, operating systems, and architectures. The main aim of this paper is to study the middleware technologies for CoT. Toward this end, we first present the main features and characteristics of middlewares. Next, we study different architecture styles and service domains. Then, we present several middlewares that are suitable for CoT-based platforms and finally, a list of current challenges and issues in the design of CoT-based middlewares is discussed.  相似文献   

12.
物联网搜索技术综述   总被引:1,自引:0,他引:1  
随着物联网的普及和发展,物联网搜索是摆在学术界和工业界面前迫切需要解决的问题,物联网搜索因此成为当前的一个研究热点。面对越来越多的传感器以及它们所产生的数据,只有结合智能的物联网搜索,才能体现这些数据的生命力。与传统的Baidu、Google、Bing、Yahoo等搜索引擎不同,物联网搜索从搜索对象、物理网数据的特点(大规模的、实时变化的、高度动态的、异构的、复杂的安全环境等)到物联网搜索的架构均与传统互联网不同,这导致了物联网搜所面临的挑战将更大。由此,阐述了物联网搜索的概念、特点、相关技术,对现有的典型系统和算法进行了比较性总结,分析了目前研究中存在的问题和挑战,并展望了其未来的发展方向。  相似文献   

13.
Internet technology is very pervasive today. The number of devices connected to the Internet, those with a digital identity, is increasing day by day. With the developments in the technology, Internet of Things (IoT) become important part of human life. However, it is not well defined and secure. Now, various security issues are considered as major problem for a full-fledged IoT environment. There exists a lot of security challenges with the proposed architectures and the technologies which make the backbone of the Internet of Things. Some efficient and promising security mechanisms have been developed to secure the IoT environment, however, there is a lot to do. The challenges are ever increasing and the solutions have to be ever improving. Therefore, aim of this paper is to discuss the history, background, statistics of IoT and security based analysis of IoT architecture. In addition, we will provide taxonomy of security challenges in IoT environment and taxonomy of various defense mechanisms. We conclude our paper discussing various research challenges that still exist in the literature, which provides better understanding of the problem, current solution space, and future research directions to defend IoT against different attacks.  相似文献   

14.
Islam  Md. Motaharul  Khan  Zaheer  Alsaawy  Yazed 《Wireless Networks》2021,27(6):4331-4342

Internet of Things (IoT) refers to uniquely identifiable entities. Its vision is the world of connected objects. Due to its connected nature the data produced by IoT is being used for different purposes. Since IoT generates huge amount of data, we need some scalable storage to store and compute the data sensed from the sensors. To overcome this issue, we need the integration of cloud and IoT, so that the data might be stored and computed in a scalable environment. Harmonization of IoT in Cloud might be a novel solution in this regard. IoT devices will interact with each other using Constrained Application Protocol (CoAP). In this paper, we have implemented harmonizing IoT in Cloud. We have used CoAP to get things connected to each other through the Internet. For the implementation we have used two sensors, fire detector and the sensor attached with the door which is responsible for opening it. Thus our implementation will be storing and retrieving the sensed data from the cloud. We have also compared our implementation with different parameters. The comparison shows that our implementation significantly improves the performance compared to the existing system.

  相似文献   

15.
The challenge raised by the introduction of Internet of Things (IoT) concept will permanently shape the networking and communications landscape and will therefore have a significant social impact. The ongoing IoT research activities are directed towards the definition and design of open architectures and standards, but there are still many issues requiring a global consensus before the final deployment. The paper presents and discusses the IoT architectural frameworks proposed under the ongoing standardization efforts, design issues in terms of IoT hardware and software components, as well as the IoT application domain representatives, such as smart cities, healthcare, agriculture, and nano-scale applications (addressed within the concept of Internet of Nano-Things). In order to obtain the performances related to recently proposed protocols for emerging Industrial Internet of Things applications, the preliminary results for Message Queuing Telemetry Transport and Time-Slotted Channel Hopping protocols are provided. The testing was performed on OpenMote hardware platform and two IoT operating systems: Contiki and OpenWSN.  相似文献   

16.
Trust management has been proven to be a useful technology for providing security service and as a consequence has been used in many applications such as P2P,Grid,ad hoc network and so on.However,few researches about trust mechanism for Internet of Things(IoT) could be found in the literature,though we argue that considerable necessity is held for applying trust mechanism to IoT.In this paper,we establish a formal trust management control mechanism based on architecture modeling of IoT.We decompose the IoT into three layers,which are sensor layer,core layer and application layer,from aspects of network composition of IoT.Each layer is controlled by trust management for special purpose:self-organized,affective routing and multi-service respectively.And the final decision-making is performed by service requester according to the collected trust information as well as requester' policy.Finally,we use a formal semantics-based and fuzzy set theory to realize all above trust mechanism,the result of which provides a general framework for the development of trust models of IoT.  相似文献   

17.
Almusaylim  Zahrah A.  Zaman  Noor 《Wireless Networks》2019,25(6):3193-3204

The smart home is considered as an essential domain in Internet of Things (IoT) applications, it is an interconnected home where all types of things interact with each other via the Internet. This helps to automate the home by making it smart and interconnected. However, at the same time, it raises a great concern of the privacy and security for the users due to its capability to be controlled remotely. Hence, the rapid technologically growth of IoT raises abundant challenges such as how to provide the home users with safe and secure services keeping privacy in the account and how to manage the smart home successfully under the controlled condition to avoid any further secrecy or theft of personal data. A number of the research papers are available to address these critical issues, researchers presented different approaches to overcome these stated issues. This research review will analyze smart home approaches, challenges and will suggest possible solutions for them and illustrate open issues that still need to be addressed.

  相似文献   

18.
Stimulus-responsive materials with designable integrated functions bridge the intelligent systems in future lifestyles with the Internet of Things (IoT). The growing trend for IoT and corresponding advanced devices will involve a great number of electronic disposables, which may place heavy burdens on the environment. Here, an elaborately designed multistage responsive material is reported for real-time, reversible light-writing based on organized stage-by-stage responsive behaviors and polarity-dependent physicochemical fluorescence response, where the stimulus is accurately delivered through a completely reversible “light-heat-fluorescence” pathway. The resulted materials can be pollution-freely written by hand-controlled near-infrared laser within 5 s, spontaneously erased within 20 s, and exhibit excellent re-writing ability (more than 5000 times while the variance of chromaticity coordinates <0.0008), which is difficult to achieve by traditional laser writing technologies. This study is a step toward high-performance long-life functional devices based on reversible multistage responsive materials for future IoT lifestyles.  相似文献   

19.
This study presents a case application of a socio-technical framework to assess and predict the development of the Internet of Things (IoT) in Korea. Applying a socio-technical system approach to the IoT, this paper seeks a clear understanding of how the IoT will evolve and stabilize in a smart environment. It investigates the complex interaction between social and technical aspects of the IoT, by highlighting the co-evolution, interaction, and interface, which constitute the next generation network environment. It describes the challenges in designing, deploying, and sustaining the diverse components of the IoT, and provides a snapshot of Korea’s current approach to meeting this challenge. Finally, the findings of this study provide insights into these challenges and opportunities, by offering a socio-technical analysis of IoT development. The insights help to conceptualize how the IoT can be designed and situated within human-centered contexts.  相似文献   

20.
Wireless Personal Communications - The integration of everyday objects into the Internet represents the foundation of the forthcoming Internet of Things (IoT). Smart objects will be the building...  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号