2015
DOI: 10.14257/ijmue.2015.10.12.05
|View full text |Cite
|
Sign up to set email alerts
|

Layering the Internet-of-Things with Multicasting in Flow-Sensors for Internet-of-Services

Abstract: Development of Internet-of-Services will be hampered by heterogeneous Internet-of-

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2017
2017
2021
2021

Publication Types

Select...
5
2
1

Relationship

4
4

Authors

Journals

citations
Cited by 11 publications
(7 citation statements)
references
References 15 publications
0
7
0
Order By: Relevance
“…Influenced by the above-mentioned drawbacks of IoT architectures, a five-layered service-oriented IoT architecture ( Figure 2 ): layer 1 (IoT Objects Layer), layer 2 (Sensing & Monitoring Layer), layer 3 (Network & Communications Layer), layer 4 (Storage and Management Layer), and layer 5 (Smart-Services Layer) was proposed and discussed in our previous papers [ 28 , 29 ]. Identity management and authentication of IoT devices near to the source (Fog/Edge Layer) is essential to ensure security at layer-1, layer-2, and layer-3 of the proposed IoT architecture.…”
Section: Background and Motivationmentioning
confidence: 99%
See 1 more Smart Citation
“…Influenced by the above-mentioned drawbacks of IoT architectures, a five-layered service-oriented IoT architecture ( Figure 2 ): layer 1 (IoT Objects Layer), layer 2 (Sensing & Monitoring Layer), layer 3 (Network & Communications Layer), layer 4 (Storage and Management Layer), and layer 5 (Smart-Services Layer) was proposed and discussed in our previous papers [ 28 , 29 ]. Identity management and authentication of IoT devices near to the source (Fog/Edge Layer) is essential to ensure security at layer-1, layer-2, and layer-3 of the proposed IoT architecture.…”
Section: Background and Motivationmentioning
confidence: 99%
“…It is the smart-service layer in the service-oriented architecture presented in Figure 2 . Data collected from the end IoT devices are processed at different IoT layers and are presented as information in the end-user applications [ 28 ]. In a centralized cloud-centric model, IoT data is always presented to the IoT applications via the cloud computing layer.…”
Section: Background and Motivationmentioning
confidence: 99%
“…2 DLT-based microgrid can make decision based on the defined of local market participants and the form of energy traded will be defined. To realize the above architecture following increase of the security of energy supply or the integration of local renewable generation into the energy supply system must be consider scalability [19], [20] and [21]. In order to address scalability and different from existing approaches by propose logical clustering on the DLT-based microgrid shown in Fig.…”
Section: Dlt For Clustered Local Microgridmentioning
confidence: 99%
“…The mutual trust could resolve point-to-point problems, however, routing and switching still allow data to be decrypted at potential untrusted end-points. Keeping in mind that sensor devices should not be connected directly to the internet [16]. Gateway devices already introduce privacy concerns due to SSL offloading or decryption.…”
Section: Challenges and Opportunitiesmentioning
confidence: 99%