Filters








408 Hits in 4.4 sec

Adapting SDN datacenters to support Cloud IIoT applications

Pedro Goncalves, Joaquim Ferreira, Paulo Pedreiras, Daniel Corujo
2015 2015 IEEE 20th Conference on Emerging Technologies & Factory Automation (ETFA)  
IIoT (Industrial Internet of Things) cloud applications require reliable, fault-tolerant networks, supporting real-time guarantees and allowing interaction with other applications already existing in the  ...  This paper presents a SDN management approach for IIoT datacenters, which provides an efficient fault-tolerant network, enabled with deterministic QoS guarantees.  ...  Physical and industrial processes are controlled through a set of sensors, actuators and cyber-physical systems, which are interconnected to the IP world via gateways.  ... 
doi:10.1109/etfa.2015.7301641 dblp:conf/etfa/GoncalvesFPC15 fatcat:uneainkigvh27ohnkhgtrycg2a

Table of Contents

2021 2021 IEEE 46th Conference on Local Computer Networks (LCN)  
Cyber-Physical Systems 511 Toward a Lightweight Machine Learning Based Solution Against Cyber-Intrusions for IoT 519 CSDN: CDN-Aware QoE Optimization in SDN-Assisted HTTP Adaptive Video Streaming 525  ...  241 Transfer Learning-Based Accelerated Deep Reinforcement Learning for 5G RAN Slicing 249 Progressive Mesh-Based HTTP Adaptive Augmented Reality Streaming System 257 Anchor-Oriented Time and  ... 
doi:10.1109/lcn52139.2021.9524933 fatcat:bopsc4l2qrc7bobzfyb6343iou

Secure key distribution with salr using wireless sensor network The major factors that lift the competence of Service Oriented Wireless Sensor Networks are Congestion control and transferring data securely. It is desirable to alter the routing and security outlines adaptively in order to retort effectually to the swiftly fluctuating Network State. Adding complexities to the routing and security schemes increases end to end delay which is not acceptable in service oriented wireless sensor networks. In this p ...

2017 International Journal of Latest Trends in Engineering and Technology  
SALR adopt the multipath assortment based on Node Strength is done at every hop to decide the most secure and least congested route.  ...  The data collected by the individual sensors is then passed on to the base station or the sink. The sink processes the accumulated data for the specific application.  ...  LITERATURE SURVEY All The system called Cyber-physical-social system (CPSS) allows individuals to share personal information collected from not only cyberspace but also physical space.  ... 
doi:10.21172/1.91.07 fatcat:szmsib4mfvh7booqhk53vqwkhy

A Survey of End-to-End Solutions for Reliable Low-Latency Communications in 5G Networks

Delia Rico, Pedro Merino
2020 IEEE Access  
systems where machines and humans interact in a low latency and high reliability scenario. 0.5-5 10 -9 [12] [7] Cyber-physical Systems Interacting networks of physical and computational components requiring  ...  The Internet of Drones [22] - [24] , IEEE tactile internet (TI) [12] , 3GPP cyber-physical systems (CPS) [13] , networked action games [25] , virtual reality/augmented reality, eHealth periodic monitoring  ... 
doi:10.1109/access.2020.3032726 fatcat:phqvszno3ndpxas4jraicgpbsi

IEEE Access Special Section Editorial: Toward Service-Centric Internet of Things (IoT): From Modeling to Practice

Yue Cao, Omprakash Kaiwartya, Xiaodong Xu, William Liu, Jaime Lloret, Yuanwei Liu, Yuan Zhuang
2021 IEEE Access  
His research interests include the design and performance evaluation of the infrastructure and protocols for packet-oriented networks.  ...  He had been working as a Network Planner and a Designer with Beijing Telecom for five years before he immigrated to New Zealand.  ...  of Things: A cyber-physical systems perspective,'' authored by Xu et al., reviewed the body of existing research on the I-IoT.  ... 
doi:10.1109/access.2021.3090136 fatcat:mjuwrb6bkrbzrpkm434czygrsq

COMBATING CYBER TERRORISM-ASSESSMENT OF LOG FOR MALICIOUS SIGNATURES

Ethala
2013 American Journal of Applied Sciences  
This is the first such attempt made in this communication wherein the results presented clearly denote the reduced rate of cyber terrorism based attacks.  ...  Combating Cyber Terrorism (CCT) Algorithm that is developed in this attempt uses multi path navigation based on six degree separation to analyze data flow inconsistency into bound and unbound values.  ...  We generate profiles for each data log users in active network or for network based profiles or host based profile that is for individual system oriented (Inagaki, 1999) .  ... 
doi:10.3844/ajassp.2013.1660.1666 fatcat:ejxettjugbhjfeycqtf3ekfkau

The State of Cybersecurity in Smart Manufacturing Systems: A Systematic Review

Armando Araújo de Souza Junior, José Luiz de Souza Pio, Jó Cunha Fonseca, Marcelo Albuquerque De Oliveira, Otávio Cesar de Paiva Valadares, Pedro Henrique Souza Da Silva
2021 European Journal of Business Management and Research  
or cyber-physical systems).  ...  With the advent of the so-called 4th Industrial Revolution, personified in the globally commented Industry 4.0, there is a change in progress in manufacturing systems, provided by the development of communication  ...  Approach for Securing Network Communications Modelling Based on Smart Multipath Routing 2020 Search criteria in the CAPES/MEC databaseuse of words security AND "smart manufacturing systems", cybersecurity  ... 
doi:10.24018/ejbmr.2021.6.6.1173 fatcat:uo3a2agr5zeippihmxelaj7v3i

2018-2020 Index Proceedings of the IEEE Vol. 106-108

2020 Proceedings of the IEEE  
., Variance-Reduced Methods for Machine Learning; 1968-1983  ...  ., +, JPROC Jan. 2018 21-37 Wireless Communication and Security Issues for Cyber-Physical Systems and the Internet-of-Things.  ...  ., +, JPROC Sept. 2018 1700-1716 Wireless Communication and Security Issues for Cyber-Physical Systems and the Internet-of-Things.  ... 
doi:10.1109/jproc.2020.3040096 fatcat:35vqtzlkgjhzdhds5dbqyccesy

Supply and Demand Oriented Energy Management in the Internet of Things

Qingjuan Li, Hong Liu, Huansheng Ning, Yang Fu, Songde Hu, Shunkun Yang
2016 Advances in Internet of Things  
The Internet of Things (IoT) is emerging as an attractive paradigm involving physical perceptions, cyber interactions, social correlations and even cognitive thinking through a cyber-physical-social-thinking  ...  reference to the IoT layers (i.e., sensor-actuator layer, network layer, and application layer), and IoT energy management is addressed from the perspectives of supply and demand to achieve green perception, communication  ...  Acknowledgements This work was funded by the National Natural Science Foundation of China (61471035) and the Fundamental Research Funds for the Central Universities (06105031).  ... 
doi:10.4236/ait.2016.61001 fatcat:6tlbn7x4wfablgjs7etpkkscci

Indoor Localization With Bluetooth: a Framework for Modelling Errors in AoA and RSSI

Pietro Boccadoroa, Domenico Colucci, Vincenzo Dentamaro, Laura Notarangelo, Giangiuseppe Tateo
2021 International Conference on Indoor Positioning and Indoor Navigation  
Indoor Positioning System, and Direction Finding problems, represent an interesting playground for Internet of Things technologies.  ...  reliability.  ...  In particular, it aims at developing a cyber-physical system that combines both Wi-Fi and Bluetooth technologies.  ... 
dblp:conf/ipin/BoccadoroaCDNT21 fatcat:amjncjmslbblha7r3osen5mjy4

2020 Index IEEE Internet of Things Journal Vol. 7

2020 IEEE Internet of Things Journal  
., Rateless-Code-Based Secure Cooperative Transmission Scheme for Industrial IoT; JIoT July 2020 6550-6565 Jamalipour, A., see Murali, S., JIoT Jan. 2020 379-388 James, L.A., see Wanasinghe, T.R.,  ...  ., +, JIoT April 2020 3363-3377 Cyber-physical systems Adversarial Attacks and Defenses on Cyber-Physical Systems: A Survey.  ...  ., +, JIoT June 2020 5103-5115 Blockchain-Based Trustworthy Edge Caching Scheme for Mobile Cyber-Physical System.  ... 
doi:10.1109/jiot.2020.3046055 fatcat:wpyblbhkrbcyxpnajhiz5pj74a

Multi DODAGs in RPL for Reliable Smart City IoT

A. Sebastian, S. Sivagurunathan
2018 Journal of Cyber Security and Mobility  
IoT infrastructure consists of sensing devices, communication protocols, data management systems and application protocols. Basically IoT networks are resource constrained networks.  ...  This way IoT architecture differs from traditional IP based network.  ...  ContikiRPL is an open source operating system for the Internet of Things. Contiki connects tiny low-cost, low-power microcontrollers to the Internet.  ... 
doi:10.13052/jcsm2245-1439.716 fatcat:ehzns7yo4zh2dkggnbfvgdpgiq

Message-Oriented Middleware with QoS Awareness [chapter]

Hao Yang, Minkyong Kim, Kyriakos Karenos, Fan Ye, Hui Lei
2009 Lecture Notes in Computer Science  
Publish/subscribe messaging is a fundamental mechanism for interconnecting disparate services and systems in the service-oriented computing architecture.  ...  In this paper, we present the design and implementation of Harmony, an overlay-based messaging system that can manage the end-to-end QoS in wide-area publish/subscribe communications based on the application  ...  We are grateful to Maria Ebling, Francis Parr and Paul Giangarra for their support and valuable feedback. We also thank the anonymous reviewers for their insightful comments.  ... 
doi:10.1007/978-3-642-10383-4_22 fatcat:g4e433up3vettabwmrrzamt4zi

Injecting Reliable Radio Frequency Fingerprints Using Metasurface for The Internet of Things [article]

Sekhar Rajendran, Zhi Sun, Feng Lin, Kui Ren
2020 arXiv   pre-print
The security vulnerabilities are analyzed for some of the most threatening wireless physical layer-based attacks.  ...  We have conducted comprehensive system evaluations including distance, orientation, multiple channels where the feasibility, effectiveness, and reliability of these fingerprints are validated.  ...  PROBLEM DEFINITION AND SOLUTION RF-fingerprinting being an up-and-coming solution for the Internet of Things has certain well-established drawbacks : A. Reliability vs.  ... 
arXiv:2006.06895v3 fatcat:assk5szutnapzctjkx7wnxal4a

2021 Index IEEE Transactions on Industrial Informatics Vol. 17

2021 IEEE Transactions on Industrial Informatics  
The Author Index contains the primary entry for each item, listed under the first author's name.  ...  ., +, TII May 2021 3671-3681 Nonlinear MIMO for Industrial Internet of Things in Cyber-Physical Systems.  ...  ., +, TII Aug. 2021 5595-5604 Nonlinear MIMO for Industrial Internet of Things in Cyber-Physical Systems.  ... 
doi:10.1109/tii.2021.3138206 fatcat:ulsazxgmpfdmlivigjqgyl7zre
« Previous Showing results 1 — 15 out of 408 results