• Title/Summary/Keyword: IoT architectures

Search Result 27, Processing Time 0.022 seconds

Low-latency 5G architectures for mission-critical Internet of Things (IoT) services

  • Choi, Changsoon;Park, Jong-Han;Na, Minsoo;Jo, Sungho
    • Information and Communications Magazine
    • /
    • v.32 no.9
    • /
    • pp.17-23
    • /
    • 2015
  • This paper presents design methodologies for 5G architecture ensuring lower latency than 4G/LTE. Among various types of 5G use cases discussed in standardization bodies, we believe mobile broadband, massive IoT(Internet of Things) and mission-critical IoT will be the main 5G use cases. In particular, a mission-critical IoT service such as remote controlled machines and connected cars is regarded as one of the most distinguished use cases, and it is indispensable for underlying networks to support sufficiently low latency to support them. We identify three main strategic directions for end-to-end network latency reduction, namely new radio access technologies, distributed/flat network architecture, and intelligent end-to-end network orchestration.

Distributed Edge Computing for DNA-Based Intelligent Services and Applications: A Review (딥러닝을 사용하는 IoT빅데이터 인프라에 필요한 DNA 기술을 위한 분산 엣지 컴퓨팅기술 리뷰)

  • Alemayehu, Temesgen Seyoum;Cho, We-Duke
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.9 no.12
    • /
    • pp.291-306
    • /
    • 2020
  • Nowadays, Data-Network-AI (DNA)-based intelligent services and applications have become a reality to provide a new dimension of services that improve the quality of life and productivity of businesses. Artificial intelligence (AI) can enhance the value of IoT data (data collected by IoT devices). The internet of things (IoT) promotes the learning and intelligence capability of AI. To extract insights from massive volume IoT data in real-time using deep learning, processing capability needs to happen in the IoT end devices where data is generated. However, deep learning requires a significant number of computational resources that may not be available at the IoT end devices. Such problems have been addressed by transporting bulks of data from the IoT end devices to the cloud datacenters for processing. But transferring IoT big data to the cloud incurs prohibitively high transmission delay and privacy issues which are a major concern. Edge computing, where distributed computing nodes are placed close to the IoT end devices, is a viable solution to meet the high computation and low-latency requirements and to preserve the privacy of users. This paper provides a comprehensive review of the current state of leveraging deep learning within edge computing to unleash the potential of IoT big data generated from IoT end devices. We believe that the revision will have a contribution to the development of DNA-based intelligent services and applications. It describes the different distributed training and inference architectures of deep learning models across multiple nodes of the edge computing platform. It also provides the different privacy-preserving approaches of deep learning on the edge computing environment and the various application domains where deep learning on the network edge can be useful. Finally, it discusses open issues and challenges leveraging deep learning within edge computing.

QoS-Aware Optimal SNN Model Parameter Generation Method in Neuromorphic Environment (뉴로모픽 환경에서 QoS를 고려한 최적의 SNN 모델 파라미터 생성 기법)

  • Seoyeon Kim;Bongjae Kim;Jinman Jung
    • Smart Media Journal
    • /
    • v.12 no.4
    • /
    • pp.19-26
    • /
    • 2023
  • IoT edge services utilizing neuromorphic hardware architectures are suitable for autonomous IoT applications as they perform intelligent processing on the device itself. However, spiking neural networks applied to neuromorphic hardware are difficult for IoT developers to comprehend due to their complex structures and various hyper-parameters. In this paper, we propose a method for generating spiking neural network (SNN) models that satisfy user performance requirements while considering the constraints of neuromorphic hardware. Our proposed method utilizes previously trained models from pre-processed data to find optimal SNN model parameters from profiling data. Comparing our method to a naive search method, both methods satisfy user requirements, but our proposed method shows better performance in terms of runtime. Additionally, even if the constraints of new hardware are not clearly known, the proposed method can provide high scalability by utilizing the profiled data of the hardware.

Study of Static Analysis and Ensemble-Based Linux Malware Classification (정적 분석과 앙상블 기반의 리눅스 악성코드 분류 연구)

  • Hwang, Jun-ho;Lee, Tae-jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.6
    • /
    • pp.1327-1337
    • /
    • 2019
  • With the growth of the IoT market, malware security threats are steadily increasing for devices that use the linux architecture. However, except for the major malware causing serious security damage such as Mirai, there is no related technology or research of security community about linux malware. In addition, the diversity of devices, vendors, and architectures in the IoT environment is further intensifying, and the difficulty in handling linux malware is also increasing. Therefore, in this paper, we propose an analysis system based on ELF which is the main format of linux architecture, and a binary based analysis system considering IoT environment. The ELF-based analysis system can be pre-classified for a large number of malicious codes at a relatively high speed and a relatively low-speed binary-based analysis system can classify all the data that are not preprocessed. These two processes are supposed to complement each other and effectively classify linux-based malware.

A Survey of Application Layer Protocols of Internet of Things

  • bibi, Nawab;Iqbal, Faiza;Akhtar, Salwa Muhammad;Anwar, Rabia;bibi, Shamshad
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.11
    • /
    • pp.301-311
    • /
    • 2021
  • The technological advancements of the last two decades directed the era of the Internet of Things (IoT). IoT enables billions of devices to connect through the internet and share their information and resources on a global level. These devices can be anything, from smartphones to embedded sensors. The main purpose of IoT is to make devices capable of achieving the desired goal with minimal to no human intervention. Although it hascome as a social and economic blessing, it still brought forward many security risks. This paper focuses on providing a survey of the most commonly used application layer protocols in the IoT domain, namely, Constrained Application Protocol (CoAP), Message Queuing Telemetry Transport (MQTT), Advanced Message Queuing Protocol (AMQP), and Extensible Messaging and Presence Protocol (XMPP). MQTT, AMQP, and XMPP use TCP for device-to-device communication, while CoAP utilizes UDP to achieve this purpose. MQTT and AMQP are based on a publish/subscribe model, CoAP uses the request/reply model for its structuring. In addition to this, the quality of service provision of MQTT, AMQP, and CoAP is not very high, especially when the deliverance of messages is concerned. The selection of protocols for each application is very a tedious task.This survey discusses the architectures, advantages, disadvantages, and applications of each of these protocols. The main contribution of this work is to describe each of the aforementioned application protocols in detail as well as providing their thorough comparative analysis. This survey will be helpful to the developers in selecting the protocol ideal for their system and/or application.

A Customization Method for Mobile App.'s Performance Improvement (모바일 앱의 성능향상을 위한 커스터마이제이션 방안)

  • Cho, Eun-Sook;Kim, Chul-Jin
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.11
    • /
    • pp.208-213
    • /
    • 2016
  • In the fourth industrial revolution, customization is becoming a conversation topic in various domains. Industry 4.0 applies cyber-physical systems (CPS), the Internet of Things (IoT), and cloud computing to manufacturing businesses. One of the main phrases in Industry 4.0 is mass customization. Optimized products or services are developed and provided through customization. Therefore, the competitiveness of a product can be enhanced, and satisfaction is improved. In particular, as IoT technology spreads, customization is an essential aspect of smooth service connections between various devices or things. Customized services in mobile applications are assembled and operate in various mobile devices in the mobile environment. Therefore, this paper proposes a method for improving customized cloud server-based mobile architectures, processes, and metrics, and for measuring the performance improvement of the customized architectures operating in various mobile devices based on the Android or IOS platforms. We reduce the total time required for customization in half as a result of applying the proposed customized architectures, processes, and metrics in various devices.

A Study on Classification of CNN-based Linux Malware using Image Processing Techniques (영상처리기법을 이용한 CNN 기반 리눅스 악성코드 분류 연구)

  • Kim, Se-Jin;Kim, Do-Yeon;Lee, Hoo-Ki;Lee, Tae-Jin
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.21 no.9
    • /
    • pp.634-642
    • /
    • 2020
  • With the proliferation of Internet of Things (IoT) devices, using the Linux operating system in various architectures has increased. Also, security threats against Linux-based IoT devices are increasing, and malware variants based on existing malware are constantly appearing. In this paper, we propose a system where the binary data of a visualized Executable and Linkable Format (ELF) file is applied to Local Binary Pattern (LBP) image processing techniques and a median filter to classify malware in a Convolutional Neural Network (CNN). As a result, the original image showed the highest accuracy and F1-score at 98.77%, and reproducibility also showed the highest score at 98.55%. For the median filter, the highest precision was 99.19%, and the lowest false positive rate was 0.008%. Using the LBP technique confirmed that the overall result was lower than putting the original ELF file through the median filter. When the results of putting the original file through image processing techniques were classified by majority, it was confirmed that the accuracy, precision, F1-score, and false positive rate were better than putting the original file through the median filter. In the future, the proposed system will be used to classify malware families or add other image processing techniques to improve the accuracy of majority vote classification. Or maybe we mean "the use of Linux O/S distributions for various architectures has increased" instead? If not, please rephrase as intended.

Security in Network Virtualization: A Survey

  • Jee, Seung Hun;Park, Ji Su;Shon, Jin Gon
    • Journal of Information Processing Systems
    • /
    • v.17 no.4
    • /
    • pp.801-817
    • /
    • 2021
  • Network virtualization technologies have played efficient roles in deploying cloud, Internet of Things (IoT), big data, and 5G network. We have conducted a survey on network virtualization technologies, such as software-defined networking (SDN), network functions virtualization (NFV), and network virtualization overlay (NVO). For each of technologies, we have explained the comprehensive architectures, applied technologies, and the advantages and disadvantages. Furthermore, this paper has provided a summarized view of the latest research works on challenges and solutions of security issues mainly focused on DDoS attack and encryption.

Internet-of-Things Based Approach for Monitoring Pharmaceutical Cold Chain (사물인터넷을 이용한 의약품 콜드체인 관리 시스템)

  • Chandra, Abel Avitesh;Back, Jong Sang;Lee, Seong Ro
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39C no.9
    • /
    • pp.828-840
    • /
    • 2014
  • There is a new evolution in technological advancement taking place called the Internet of Things (IoT). The IoT enables physical world objects in our surroundings to be connected to the Internet. For this idea to come to life, two architectures are required: the Sensing Entity in the environment which collects data and connects to the cloud and the Cloud Service that hosts the data. In particular, the combination of wireless sensor network for sensing and cloud computing for managing sensor data is becoming a popular intervention for the IoT era. The pharmaceutical cold chain requires controlled environmental conditions for the sensitive products in order for them to maintain their potency and fit for consumption. The monitoring of distribution process is the only assurance that a process has been successfully validated. The distribution process is so critical that anomaly at any point will result in the process being no longer valid. Taking the cold chain monitoring to IoT and using its benefits and power will result in better management and product handling in the cold chain. In this paper, Arduino based wireless sensor network for storage and logistics (land and sea) is presented and integrated with Xively cloud service to offer a real-time and innovative solution for pharmaceutical cold chain monitoring.

M2M Architecture: Can It Realize Ubiquitous Computing in Daily life?

  • Babamir, Seyed Morteza
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.2
    • /
    • pp.566-579
    • /
    • 2012
  • Ubiquitous computing called pervasive one is based on the thought of pervading ability of computation in daily life applications. In other words, it aims to include computation in devices such as electronic equipment and automobiles. This has led to disengagement of computers from desktop form. Accordingly, the notice in ubiquitous computing being taken of a world steeped in remote and wireless computer-based-services. Handheld and wearable programmed devices such as sense and control appliances are such devices. This advancement is rapidly moving domestic tasks and life from device-and-human communication to the device-and-device model. This model called Machine to Machine (M2M) has led to acceleration of developments in sciences such as nano-science, bio-science, and information science. As a result, M2M led to appearance of applications in various fields such as, environment monitoring, agricultural, health care, logistics, and business. Since it is envisaged that M2M communications will play a big role in the future in all wireless applications and will be emerged as a progressive linkage for next-generation communications, this paper aims to consider how much M2M architectures can realize ubiquitous computing in daily life applications. This is carried out after acquainting and initiating readers with M2M architectures and arguments for M2M. Some of the applications was not achievable before but are becoming viable owing to emergence of M2M communications.