Abstract:Internet of Things (IoT) is a phenomenon involving connecting things or objects with sensors. The IoT market is growing rapidly, and there are strong incentives for companies to follow the trend of IoT growth and development. However, the percentage of IoT measures that are considered successful seems low. The complexity of carrying out an IoT project lies in the need to adjust all the pieces of the puzzle: assets, sensors, communications, technology, coverage, and geographical locations with precision of the … Show more
“…Real-world deployment scenarios provide the means to validate IoT solutions arising from the framework across diverse contexts on a large scale. Another common method for real-world validation is the PoC method, which is used to demonstrate how a proposed product concept or a conceptual framework can fulfill its requirements [39][40][41]. For example, a PoC can be constructed to pilot a software product before its actual development and before making a decision to invest [42].…”
“…We applied the multi-proof-of-concept (multi-PoC) methodology [41] to validate the proposed framework. We validated the proposed IoT framework through the utilization of two distinct PoC projects.…”
The trustworthiness of a system is not just about proving the identity or integrity of the hardware but also extends to the data, control, and management planes of communication between devices and the software they are running. This trust in data and device integrity is desirable for Internet of Things (IoT) systems, especially in critical environments. In this study, we developed a security framework, IoTAttest, for building IoT systems that leverage the Trusted Platform Module 2.0 and remote attestation technologies to enable the establishment of IoT devices’ collected data and control plan traffic integrity. After presenting the features and reference architecture of IoTAttest, we evaluated the privacy preservation and validity through the implementation of two proof-of-concept IoT applications that were designed by two teams of university students based on the reference architecture. After the development, the developers answered open questions regarding their experience and perceptions of the framework’s usability, limitations, scalability, extensibility, potential, and security. The results indicate that IoTAttest can be used to develop IoT systems with effective attestation to achieve device and data integrity. The proof-of-concept solutions’ outcomes illustrate the functionalities and performance of the IoT framework. The feedback from the proof-of-concept developers affirms that they perceived the framework as usable, scalable, extensible, and secure.
“…Real-world deployment scenarios provide the means to validate IoT solutions arising from the framework across diverse contexts on a large scale. Another common method for real-world validation is the PoC method, which is used to demonstrate how a proposed product concept or a conceptual framework can fulfill its requirements [39][40][41]. For example, a PoC can be constructed to pilot a software product before its actual development and before making a decision to invest [42].…”
“…We applied the multi-proof-of-concept (multi-PoC) methodology [41] to validate the proposed framework. We validated the proposed IoT framework through the utilization of two distinct PoC projects.…”
The trustworthiness of a system is not just about proving the identity or integrity of the hardware but also extends to the data, control, and management planes of communication between devices and the software they are running. This trust in data and device integrity is desirable for Internet of Things (IoT) systems, especially in critical environments. In this study, we developed a security framework, IoTAttest, for building IoT systems that leverage the Trusted Platform Module 2.0 and remote attestation technologies to enable the establishment of IoT devices’ collected data and control plan traffic integrity. After presenting the features and reference architecture of IoTAttest, we evaluated the privacy preservation and validity through the implementation of two proof-of-concept IoT applications that were designed by two teams of university students based on the reference architecture. After the development, the developers answered open questions regarding their experience and perceptions of the framework’s usability, limitations, scalability, extensibility, potential, and security. The results indicate that IoTAttest can be used to develop IoT systems with effective attestation to achieve device and data integrity. The proof-of-concept solutions’ outcomes illustrate the functionalities and performance of the IoT framework. The feedback from the proof-of-concept developers affirms that they perceived the framework as usable, scalable, extensible, and secure.
“…Many researchers have contributed to different applications like video surveillance [22], Internet of Things [23], internet of multimedia things [24] using different robust infrastructures like a cloud-based wireless network [25], 6G Technology [26], Therefore there are also many possibilities of utilizing WSN in those areas of application such as the WSN technology can be combined with video surveillance which may lead robust security system to some remote or risky place like battlefields.…”
In this paper, the establishment of efficient Wireless Sensor Network (WSN) networks has been projected to minimize the consumption of energy using a new Self-adaptive Multi-Objective Weighted Approach (SMOWA) algorithm for solving a multi-objective problem. The Different WSN nodes deployment policies have been proposed and applied in this paper to design an efficient Wireless Sensor Network to minimize energy consumption. After that, the cluster head for each cluster has been selected with the help of the duty cycle. After configuring the WSN networks, the SMOWA algorithms have been developed to obtain the minimum energy consumption for the networks. Energy minimization, as well as the amount of day-saving, has been calculated for the different WSNs which has been configured through different deployment policies. The major finding of the research paper is to improve the durability of Wireless Sensor Network (i) applying different deployment strategies: (Random, S pattern and nautilus shell pattern), and (ii) using a new Meta-heuristic algorithm (SMOWA Algorithm). In this research, the lifetime of WSN has been increased to a significant level. To choose the best result set from all the obtained results set some constraints such as "equivalent distribution", "number of repetitions", "maximum amount energy storage by a node" has been set to an allowable range.
“…It is mainly used as a routing protocol in wireless random networks and can implement unicast and multicast routing. e steps of the routing algorithm are as follows [7,8]: (iii) Search path process e source node first checks its own routing table to see if there is a path from the source node to the destination node in the table, and if not, broadcasts the routing request to the neighboring nodes. When each node receives a message, it inquires whether there is a requested path in its routing table and sends the path information to the source node if it exists; if it does not exist, it continues to broadcast to other neighboring nodes.…”
With the rapid development of the city, the city’s intelligent lighting control system has gradually replaced the traditional lighting control system. But at present, there are still some problems in urban street lamp lighting control, such as a low level of intelligence, a huge waste of electric energy, improper maintenance, and so on. Firstly, aiming at the problem of untimely detection of street lamp faults, this paper adds GIS technology to the intelligent lighting system and uses GIS to locate the faulty street lamp. To improve the accuracy of intelligent dimming, an improved intelligent dimming algorithm based on a support vector machine is proposed. To verify the effectiveness of the proposed algorithm, an intelligent lighting control system based on an improved algorithm and GIS technology is designed in this paper. It can control the street light switch in real-time and monitor the working condition of the street light in real-time. The performance of the improved system is verified by experiments. The experimental results show that the system achieves automatic dimming function through an improved dimming algorithm; the system can alarm and locate the fault lamp position quickly; the system can achieve a greater energy-saving effect.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.