مشخصات مقاله | |
ترجمه عنوان مقاله | اینترنت اشیا آینده: امن، کارآمد و مبتنی بر مدل |
عنوان انگلیسی مقاله | The Future Internet of Things: Secure, Efficient, and Model-Based |
انتشار | مقاله سال 2017 |
تعداد صفحات مقاله انگلیسی | 13 صفحه |
هزینه | دانلود مقاله انگلیسی رایگان میباشد. |
پایگاه داده | نشریه IEEE |
مقاله بیس | این مقاله بیس نمیباشد |
نمایه (index) | JCR – Master Journal List – Scopus |
نوع مقاله | ISI |
فرمت مقاله انگلیسی | |
ایمپکت فاکتور(IF) |
7.137 در سال 2017 |
شاخص H_index | 31 در سال 2019 |
شاخص SJR | 1.341 در سال 2017 |
شناسه ISSN | 2327-4662 |
شاخص Quartile (چارک) | Q1 در سال 2017 |
رشته های مرتبط | مهندسی فناوری اطلاعات |
گرایش های مرتبط | اینترنت و شبکه های گسترده |
نوع ارائه مقاله |
ژورنال |
مجله | مجله IEEE اینترنت اشیا – IEEE Internet of Things Journal |
دانشگاه | Department of Mechanical Engineering – Massachusetts Institute of Technology – USA |
کلمات کلیدی | اینترنت اشیا، معماری شبکه، فن آوری های در حال ظهور |
کلمات کلیدی انگلیسی | Internet of Things، Networking Architecture، Emerging Technologies |
شناسه دیجیتال – doi |
https://doi.org/10.1109/JIOT.2017.2755620 |
کد محصول | E10763 |
وضعیت ترجمه مقاله | ترجمه آماده این مقاله موجود نمیباشد. میتوانید از طریق دکمه پایین سفارش دهید. |
دانلود رایگان مقاله | دانلود رایگان مقاله انگلیسی |
سفارش ترجمه این مقاله | سفارش ترجمه این مقاله |
فهرست مطالب مقاله: |
Abstract
I- Introduction and Contents II- Prior Art III- Human Inspiration IV- System Embodiment V- Example Application of Data Proxy VI- Conclusion VII- Future Work References |
بخشی از متن مقاله: |
Abstract The Internet of Things’ (IoT’s) rapid growth is constrained by resource use and fears about privacy and security. A solution jointly addressing security, efficiency, privacy, and scalability is needed to support continued expansion. We propose a solution modeled on human use of context and cognition, leveraging cloud resources to facilitate IoT on constrained devices. We present an architecture applying process knowledge to provide security through abstraction and privacy through remote data fusion. We outline five architectural elements and consider the key concepts of the “data proxy” and the “cognitive layer.” The data proxy uses system models to digitally mirror objects with minimal input data, while the cognitive layer applies these models to monitor the system’s evolution and to simulate the impact of commands prior to execution. The data proxy allows a system’s sensors to be sampled to meet a specified quality of data target with minimal resource use. The efficiency improvement of this architecture is shown with an example vehicle tracking application. Finally, we consider future opportunities for this architecture to reduce technical, economic, and sentiment barriers to the adoption of the IoT. Introduction & Contents The Internet of Things (IoT) is a term describing a system of connected people, devices, and services [1]. The IoT allows computer-interfaced sensors and actuators to facilitate novel products and services by reducing costs, improving efficiency, and enhancing the usability of existing systems. The benefits of connectivity are understood across industries, with Connected Cars and Homes, Smart Factories, Wearable Devices, and Intelligent Infrastructure signaling the widespread adoption of the Internet of Things. Few technical, economic, and social barriers, like support costs [2] and concerns about data privacy and system security, [3] limit this technology’s opportunity space. Today, power and bandwidth consumption challenge IoT’s growth. The desire for rich data and information sharing dominates resource use, particularly challenging battery life and network loading for distributed wireless devices [4], [5]. A simultaneous proliferation of high-value connected devices makes the IoT a desirable attack surface [2], [6] and drives security-related resource requirements, demanding highpowered computation – lest a platform become unfavorable for mission-critical applications. This paper builds upon the author’s dissertation [7] to demonstrate an approach leveraging scalable cloud resources to address efficiency, privacy and security for next-generation IoT. In Section II, we identify a need for IoT architecture improving system-wide efficiency and security, and discuss contemporary research. Then, we consider how people process, share, and protect information in Section III. In Section IV, we present a human-inspired model for data collection, synthesis, distribution, and protection. We develop a parallel IoT architecture utilizing process and measurement knowledge to reduce the cost of sampling sensors and transmitting data. This approach leverages system knowledge to provide security through abstraction and data privacy through remote sensor fusion. |