Internet of Things最新文献

筛选
英文 中文
TinyWolf — Efficient on-device TinyML training for IoT using enhanced Grey Wolf Optimization TinyWolf - 利用增强型灰狼优化技术为物联网提供高效的设备上 TinyML 训练
IF 6 3区 计算机科学
Internet of Things Pub Date : 2024-09-05 DOI: 10.1016/j.iot.2024.101365
{"title":"TinyWolf — Efficient on-device TinyML training for IoT using enhanced Grey Wolf Optimization","authors":"","doi":"10.1016/j.iot.2024.101365","DOIUrl":"10.1016/j.iot.2024.101365","url":null,"abstract":"<div><p>Training a deep learning model generally requires a huge amount of memory and processing power. Once trained, the learned model can make predictions very fast with very little resource consumption. The learned weights can be fitted into a microcontroller to build affordable embedded intelligence systems which is also known as TinyML. Although few attempts have been made, the limits of the state-of-the-art training of a deep learning model within a microcontroller can be pushed further. Generally deep learning models are trained with gradient optimizers which predict with high accuracy but require a very high amount of resources. On the other hand, nature-inspired meta-heuristic optimizers can be used to build a fast approximation of the model’s optimal solution with low resources. After a rigorous test, we have found that Grey Wolf Optimizer can be modified for enhanced uses of main memory, paging and swap space among <span><math><mrow><mi>α</mi><mo>,</mo><mspace></mspace><mi>β</mi><mo>,</mo><mspace></mspace><mi>δ</mi></mrow></math></span> and <span><math><mi>ω</mi></math></span> wolves. This modification saved up to 71% memory requirements compared to gradient optimizers. We have used this modification to train the TinyML model within a microcontroller of 256KB RAM. The performances of the proposed framework have been meticulously benchmarked on 13 open-sourced datasets.</p></div>","PeriodicalId":29968,"journal":{"name":"Internet of Things","volume":null,"pages":null},"PeriodicalIF":6.0,"publicationDate":"2024-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2542660524003068/pdfft?md5=ab42e32e095597b7bee6c567498b913a&pid=1-s2.0-S2542660524003068-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142147573","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
DISFIDA: Distributed Self-Supervised Federated Intrusion Detection Algorithm with online learning for health Internet of Things and Internet of Vehicles DISFIDA:为健康物联网和车联网提供在线学习的分布式自监督联合入侵检测算法
IF 6 3区 计算机科学
Internet of Things Pub Date : 2024-09-04 DOI: 10.1016/j.iot.2024.101340
{"title":"DISFIDA: Distributed Self-Supervised Federated Intrusion Detection Algorithm with online learning for health Internet of Things and Internet of Vehicles","authors":"","doi":"10.1016/j.iot.2024.101340","DOIUrl":"10.1016/j.iot.2024.101340","url":null,"abstract":"<div><p>Networked health systems are often the victims of cyberattacks with serious consequences for patients and healthcare costs, with the Internet of Things (IoT) being an additional prime target. In future systems we can imagine that the Internet of Vehicles (IoV) will also be used for conveying patients for diagnosis and treatment in an integrated manner. Thus the medical field poses very significant and specific challenges since even for a single patient, several providers may carry out tests or offer healthcare services, and may have distinct interconnected sub-contractors for services such as ambulances and connected cars, connected devices or temporary staff providers, that have distinct confidentiality requirements on top of possible commercial competition. On the other hand, these distinct entities can be subject to similar or coordinated attacks, and could benefit from each others’ cybersecurity experience to better detect and mitigate cyberattacks. Thus the present work proposes a novel Distributed Self-Supervised Federated Intrusion Detection Algorithm (DISFIDA), with Online Self-Supervised Federated Learning, that uses Dense Random Neural Networks (DRNN). In DISFIDA learning data is private, and neuronal weights are shared among Federated partners. Each partner in DISFIDA combines its synaptic weights with those it receives other partners, with a preference for those weights that have closer numerical values to its own weights which it has learned on its own. DISFIDA is tested with three open-access datasets against five benchmark methods, for two relevant IoT healthcare applications: networks of devices (e.g., body sensors), and Connected Smart Vehicles (e.g., ambulances that transport patients). These tests show that the DISFIDA approach offers 100% True Positive Rate for attacks (one percentage point better than comparable state of the art methods which attain 99%) so that it does better at detecting attacks, with 99% True Negative Rate similar to state-of-the-art Federated Learning, for Distributed Denial of Service (DDoS) attacks.</p></div>","PeriodicalId":29968,"journal":{"name":"Internet of Things","volume":null,"pages":null},"PeriodicalIF":6.0,"publicationDate":"2024-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2542660524002816/pdfft?md5=3f8cac47e530cac8c010a7b776652d64&pid=1-s2.0-S2542660524002816-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142147571","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fine-grained vulnerability detection for medical sensor systems 医疗传感器系统的细粒度漏洞检测
IF 6 3区 计算机科学
Internet of Things Pub Date : 2024-09-03 DOI: 10.1016/j.iot.2024.101362
{"title":"Fine-grained vulnerability detection for medical sensor systems","authors":"","doi":"10.1016/j.iot.2024.101362","DOIUrl":"10.1016/j.iot.2024.101362","url":null,"abstract":"<div><p>The Internet of Things (IoT) has revolutionized the healthcare system by connecting medical sensors to the internet, while also posing challenges to the security of medical sensor networks (MSN). Given the extreme sensitivity of medical data, any vulnerability may result in data breaches and misuse, impacting patient safety and privacy. Therefore, safeguarding MSN security is critical. As medical sensor devices rely on smart healthcare software systems for data management and communication, precisely detecting system code vulnerabilities is essential to ensuring network security. Effective software vulnerability detection targets two key objectives: (i) achieving high accuracy and (ii) directly identifying vulnerable code lines for developers to fix. To address these challenges, we introduce Vulcoder, a novel vulnerability-oriented, encoder-driven model based on the Bidirectional Encoder Representations from Transformers (BERT) architecture. We propose a one-to-one mapping function to capture code semantics through abstract syntax trees (AST). Combined with multi-head attention, Vulcoder achieves precise function- and line-level detection of software vulnerabilities in MSN. This accelerates the vulnerability remediation process, thereby strengthening network security. Experimental results on various datasets demonstrate that Vulcoder outperforms previous models in identifying vulnerabilities within MSN. Specifically, it achieves a 1%–419% improvement in function-level prediction F1 scores and a 12.5%–380% increase in line-level localization precision. Therefore, Vulcoder helps enhance security defenses and safeguard patient privacy in MSN, facilitating the development of smart healthcare.</p></div>","PeriodicalId":29968,"journal":{"name":"Internet of Things","volume":null,"pages":null},"PeriodicalIF":6.0,"publicationDate":"2024-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2542660524003032/pdfft?md5=ec517a1daef40dd544058b39166a1eae&pid=1-s2.0-S2542660524003032-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142163601","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhancing security of Internet of Robotic Things: A review of recent trends, practices, and recommendations with encryption and blockchain techniques 加强机器人物联网的安全性:利用加密和区块链技术回顾近期趋势、做法和建议
IF 6 3区 计算机科学
Internet of Things Pub Date : 2024-09-02 DOI: 10.1016/j.iot.2024.101357
{"title":"Enhancing security of Internet of Robotic Things: A review of recent trends, practices, and recommendations with encryption and blockchain techniques","authors":"","doi":"10.1016/j.iot.2024.101357","DOIUrl":"10.1016/j.iot.2024.101357","url":null,"abstract":"<div><p>The Internet of Robotic Things (IoRT) integrates robots and autonomous devices, transforming industries such as manufacturing, healthcare, and transportation. However, security vulnerabilities in IoRT systems pose significant challenges to data privacy and system integrity. To address these issues, encryption is essential for protecting sensitive data transmitted between devices. By converting data into ciphertext, encryption ensures confidentiality and integrity, reducing the risk of unauthorized access and data breaches. Blockchain technology also enhances IoRT security by offering decentralized, tamper-proof data storage solutions. By offering comprehensive insights, practical recommendations, and future directions, this paper aims to contribute to the advancement of knowledge and practice in securing interconnected robotic systems, thereby ensuring the integrity and confidentiality of data exchanged within IoRT ecosystems. Through a thorough examination of encryption requisites, scopes, and current implementations in IoRT, this paper provides valuable insights for researchers, engineers, and policymakers involved in IoRT security efforts. By integrating encryption and blockchain technologies into IoRT systems, stakeholders can foster a secure and dependable environment, effectively manage risks, bolster user confidence, and expedite the widespread adoption of IoRT across diverse sectors. The findings of this study underscore the critical role of encryption and blockchain technology in IoRT security enhancement and highlight potential avenues for further exploration and innovation. Furthermore, this paper suggests future research areas, such as threat intelligence and analytics, security by design, multi-factor authentication, and AI for threat detection. These recommendations support ongoing innovation in securing the evolving IoRT landscape.</p></div>","PeriodicalId":29968,"journal":{"name":"Internet of Things","volume":null,"pages":null},"PeriodicalIF":6.0,"publicationDate":"2024-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2542660524002981/pdfft?md5=a4332066960a6d42faa3e5a09581d2cb&pid=1-s2.0-S2542660524002981-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142147575","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
CLARA: A cluster-based node correlation for sampling rate adaptation and fault tolerance in sensor networks CLARA:基于集群的节点关联,用于传感器网络中的采样率适应和容错
IF 6 3区 计算机科学
Internet of Things Pub Date : 2024-09-02 DOI: 10.1016/j.iot.2024.101345
{"title":"CLARA: A cluster-based node correlation for sampling rate adaptation and fault tolerance in sensor networks","authors":"","doi":"10.1016/j.iot.2024.101345","DOIUrl":"10.1016/j.iot.2024.101345","url":null,"abstract":"<div><p>Recently, wireless sensor networks (WSNs) have been proven as an efficient and low-cost solution for monitoring various kind of applications. However, the massive amount of data collected and transmitted by the sensor nodes, which are mostly redundant, will quickly consume their limited battery power, which is sometimes difficult to replace or recharge. Although the huge efforts made by researchers to solve such problem, most of the proposed techniques suffer from their accuracy and their complexity, which is not suitable for limited-resources sensors. Therefore, designing new data reduction techniques to reduce the raw data collected in such networks is becoming essential to increase their lifetime. In this paper, we propose a CLuster-based node correlation for sAmpling Rate adaptation and fAult tolerance, abbreviated CLARA, mechanism dedicated to periodic sensor network applications. Mainly, CLARA works on two stages: node correlation and fault tolerance. The first stage introduces a data clustering method that aims to search the correlation among neighboring nodes. Then, it accordingly adapts their sensing frequencies in a way to reduce the amount of data collected in such networks while preserving the information integrity at the sink. In the second stage, a fault tolerance model is proposed that allows the sink to regenerate the raw sensor data based on two methods: moving average (MA) and exponential smoothing (ES). We demonstrated the efficiency of our technique through both simulations and experiments. The best obtained results show that the first stage can reduce the sensor sampling rate, and accordingly the sensor energy, up to 64% while the second stage can accurately regenerate the raw data with an error loss less than 0.15.</p></div>","PeriodicalId":29968,"journal":{"name":"Internet of Things","volume":null,"pages":null},"PeriodicalIF":6.0,"publicationDate":"2024-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142147680","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IoTSLE: Securing IoT systems in low-light environments through finite automata, deep learning and DNA computing based image steganographic model IoTSLE:通过基于有限自动机、深度学习和 DNA 计算的图像隐写模型确保弱光环境下物联网系统的安全
IF 6 3区 计算机科学
Internet of Things Pub Date : 2024-09-02 DOI: 10.1016/j.iot.2024.101358
{"title":"IoTSLE: Securing IoT systems in low-light environments through finite automata, deep learning and DNA computing based image steganographic model","authors":"","doi":"10.1016/j.iot.2024.101358","DOIUrl":"10.1016/j.iot.2024.101358","url":null,"abstract":"<div><p>The Internet of Things (IoT) is a vast network of interconnected devices and systems, including wearables, smart home appliances, industrial machinery, and vehicles, equipped with sensors and connectivity. The data collected by the IoT devices are transmitted over a network, for processing and analyzing that data, so that appropriate actions can be initiated. Security of IoT systems is a major concern, as IoT devices collect and transmit crucial information. But images captured in low-light environments pose a challenge for IoT security by limiting the ability to accurately identify objects and people, increasing the risk of spoofing, and hindering forensic analysis. This paper unfolds a novel framework for IoT security using Steganography in Low-light Environment (IoTSLE) by image enhancement and data concealment. In proposed IoTSLE, initially, the low-light images, captured by the IoT devices in a low-light environment, are enhanced by band learning with recursion and band recomposition. After that, the secret information is concealed within the enhanced image. This concealment is supervised by using a specially designed finite automata for genome sequence encoding and 2-2-2 embedding. The proposed steganography technique is capable of hiding secret information within a 512 × 512 RGB image with the payload of 2<!--> <!-->097<!--> <!-->152 bits. The experiments like, PSNR, SSIM, Q-Index, BER, NCC, and NAE etc. are conducted to analyze the imperceptibility and security of IoTSLE. The proposed IoTSLE is useful for various IoT systems in different private and government fields like, defense agencies, digital forensics, agriculture, healthcare industry, cybersecurity firms, smart home, smart city etc.</p></div>","PeriodicalId":29968,"journal":{"name":"Internet of Things","volume":null,"pages":null},"PeriodicalIF":6.0,"publicationDate":"2024-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142169350","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An optimized and intelligent metaverse intrusion detection system based on rough sets 基于粗糙集的优化智能元宇宙入侵检测系统
IF 6 3区 计算机科学
Internet of Things Pub Date : 2024-09-02 DOI: 10.1016/j.iot.2024.101360
{"title":"An optimized and intelligent metaverse intrusion detection system based on rough sets","authors":"","doi":"10.1016/j.iot.2024.101360","DOIUrl":"10.1016/j.iot.2024.101360","url":null,"abstract":"<div><p>The convergence of the Internet of Things (IoT) and the Metaverse is revolutionizing the digital world by providing immersive, interactive environments as well as new data transmission opportunities. However, this rapid integration raises complex security issues, including an increased risk of unlawful access and data breaches. Strong cybersecurity measures are required to identify and prevent these attacks, preserving the security and confidentiality of users. Finding significant features for recognizing malicious attacks and enhancing the accuracy of network intrusion detection in general, and particularly in the virtual environment, are some of the significant research needs. This paper introduces an intelligent intrusion detection system (IIDS) based on rough set-based electric eel foraging optimization (RSEEFO) in conjunction with the AdaBoost-based classification algorithm. The main objective of this system is to detect and recognize different types of attacks on the interaction and connectivity between the IoT and the metaverse. The proposed IIDS-RSEEFO consists of three phases, which are data pre-processing, multi-IoT attack classification, and evaluation. The main problems associated with the adopted dataset are handled in data pre-processing. Then, in the second phase, a one-versus-all approach is employed along with RSEEFO and AdaBoost to handle the multi-class classification problem. Finally, several evaluation metrics are employed to assess the reliability and robustness of the proposed IIDS-RSEEFO. The proposed IIDS was tested on CIC-IoT-2023 and validated on UNSWNB-15. It achieved high accuracy across all attack types of CIC-IoT-2023, with accuracies of 99.7 %, 100 %, 100 %, 99.8 %, 100 %, 100 %, 99.8 %, and 100 % for benign traffic, DDoS, brute force, spoofing, DoS, Mirai, recon, and web-Based respectively, accompanied by robust sensitivity, F1-Score, Specificity, G-Mean, and crossover-error rate metrics demonstrating its effectiveness in accurately predicting each attack type. Additionally, it obtained high accuracy for all attack types of UNSWNB-15, with accuracies of 96.48 %, 99.12 %, 99.24 %, 93.78 %, 92.55 %, 92.55 %, 92.55 %, 94.73 %, 94.73 %, 98.09 %, 98.39 %, 99.50 %, and 99.95 % for analysis, backdoor, DoS, exploits, fuzzers, generic, normal, reconnaissance, shellcode, and worms, respectively. In addition, the results evaluated that the proposed model is superior compared to the existing intrusion detection systems.</p></div>","PeriodicalId":29968,"journal":{"name":"Internet of Things","volume":null,"pages":null},"PeriodicalIF":6.0,"publicationDate":"2024-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142147682","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Time series processing-based malicious activity detection in SCADA systems 基于时间序列处理的 SCADA 系统恶意活动检测
IF 6 3区 计算机科学
Internet of Things Pub Date : 2024-09-01 DOI: 10.1016/j.iot.2024.101355
{"title":"Time series processing-based malicious activity detection in SCADA systems","authors":"","doi":"10.1016/j.iot.2024.101355","DOIUrl":"10.1016/j.iot.2024.101355","url":null,"abstract":"<div><p>Many critical infrastructures, essential to modern life, such as oil and gas pipeline control and electricity distribution, are managed by SCADA systems. In the contemporary landscape, these systems are interconnected to the internet, rendering them vulnerable to numerous cyber-attacks. Consequently, ensuring SCADA security has become a crucial area of research. This paper focuses on detecting attacks that manipulate the timing of commands within the system, while maintaining their original order and content. To address this challenge, we propose several machine-learning-based methods. The first approach relies on Long-Short-Term Memory model, and the second utilizes Hierarchical Temporal Memory model, both renowned for their effectiveness in detecting patterns in time-series data. We rigorously evaluate our methods using a real-life SCADA system dataset and show that they outperform previous techniques designed to combat such attacks.</p></div>","PeriodicalId":29968,"journal":{"name":"Internet of Things","volume":null,"pages":null},"PeriodicalIF":6.0,"publicationDate":"2024-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142147681","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Comprehensive IoT edge based smart irrigation system for tomato cultivation 基于物联网边缘的番茄种植综合智能灌溉系统
IF 6 3区 计算机科学
Internet of Things Pub Date : 2024-08-31 DOI: 10.1016/j.iot.2024.101356
{"title":"A Comprehensive IoT edge based smart irrigation system for tomato cultivation","authors":"","doi":"10.1016/j.iot.2024.101356","DOIUrl":"10.1016/j.iot.2024.101356","url":null,"abstract":"<div><p>Agriculture industry is the primary engine for a country's economic development. Growing crops using minimum irrigation water is a major challenge for farmers. In conventional farming, crops may be affected by various diseases due to inadequate irrigation scheduling. Recent proposals have suggested using Edge-IoT, AI, and distributed computing to accelerate the inference procedure utilized in smart irrigation applications. The use of resource-constrained edge servers and edge devices used to deliver smart agriculture applications can cause latency-sensitive workloads to interfere with one another. To address this issue, we design a long-range (LoRa) edge IoT computing-based sustainable and customized smart irrigation framework to capture the real-time data of tomato plants. This helps in automatic underground drip irrigation scheduling. This also predicts total water demand and usage, and measure plant growth status. The edge-IoT cloud data transmission control and optimization has been enforced using Smart irrigation data optimization and robust transmission (SIDORT) Message Queuing Telemetry Transport (MQTT) system. We develop a hybrid algorithm named Linked least traversal (LLT) for machine-to-machine communication (M2M). Also, a Reinforcement learning (RL) based Optimal Soil Wetness Closeness Policy (OSWCP) for irrigation scheduling has been proposed. The performance of the proposed smart irrigation models has been validated through extensive experiments using real-time data in which OSWCP performance has been measured at a 97.88 % accuracy rate. Additionally, a comparison of our proposed architecture has been accomplished by resolving the existing smart irrigation system challenges.</p></div>","PeriodicalId":29968,"journal":{"name":"Internet of Things","volume":null,"pages":null},"PeriodicalIF":6.0,"publicationDate":"2024-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142136155","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IoTDeploy: Deployment of IoT Smart Applications over the Computing Continuum IoTDeploy:通过计算连续性部署物联网智能应用
IF 6 3区 计算机科学
Internet of Things Pub Date : 2024-08-31 DOI: 10.1016/j.iot.2024.101348
{"title":"IoTDeploy: Deployment of IoT Smart Applications over the Computing Continuum","authors":"","doi":"10.1016/j.iot.2024.101348","DOIUrl":"10.1016/j.iot.2024.101348","url":null,"abstract":"<div><p>IoT Smart Applications have created a demand for architectures, infrastructure, platforms, orchestration, and service deployment strategies. They are deployed from sensors to the cloud over a geographical and computing continuum, which is challenging for service orchestration and DevOps strategies. The distributed infrastructure to implement the end-to-end data path may vary, even for similar applications, concerning the services deployed over the mist, fog, edge, and cloud stages. This paper proposes and evaluates IoTDeploy, a solution for streamlining and scaling static and dynamic IoT service deployment over the continuum. IoTDeploy implements a CI/CD tool plugin for deploying applications running on the continuum and supports dynamic service migration. We evaluated the service migration from cloud to fog and fog to cloud with a case study on smart irrigation in agriculture. The experiments reveal that deployment in IoT-distributed environments is reliable and resilient, enabling migration without interrupting the application and losing data.</p></div>","PeriodicalId":29968,"journal":{"name":"Internet of Things","volume":null,"pages":null},"PeriodicalIF":6.0,"publicationDate":"2024-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142136154","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信