A Parallelization based Data Management Framework for Pervasive IoT Applications
Saniya Zahoor,Roohie Naaz Mir +1 more
TLDR
The results show an improvement in energy, processing, and storage requirements for the processing of data on the IoT device in the proposed framework as compared to the sequential approach.Abstract:
Pervasive Internet of Things (IoT) is a research paradigm that has attracted considerable attention nowadays. The main aim of pervasive IoT is that in the future, the everyday objects (devices) would be accessible, sensed, and interconnected inside the global structure of the Internet. But in most of the pervasive IoT applications, the resources of an IoT device such as storage, processing, and energy are limited; as such there is a need for management of resources in such applications. Multiple aspects related to the data such as the type of data, size of data, number of transmission and reception of data packets, the structure of data, etc are taken into consideration while managing the resources of pervasive IoT applications. Therefore data management is essential for the management of limited resources in such applications. This paper presents the recent studies and related information in data management for pervasive IoT applications having limited resources. This paper also proposes a parallelization based data management framework for resource-constrained pervasive applications of IoT. The comparison of the proposed framework is done with the sequential approach through simulations and empirical data analysis. The results show an improvement in energy, processing, and storage requirements for the processing of data on the IoT device in the proposed framework as compared to the sequential approach.read more
Citations
More filters
Proceedings ArticleDOI
ETI-ECF: Edge Computing Framework for Distribution Network Electrical Topology Identification
TL;DR: An edge computing framework for distribution network electrical topology identification (ETI-ECF) is proposed, by improving the computing capability on edge side, implement localized analysis and process of mining data and reduce the computing pressure on the server cluster of the main station.
Journal ArticleDOI
Code-based encryption techniques with distributed cluster head and energy consumption routing protocol
M. Jalasri,L. Lakshmanan +1 more
TL;DR: In addition to data security management, the introduced CBE-ECR reduces unauthorized access and manages the network lifetime successfully, leading to the effective data management of 96.17% and less energy consumption than other popular methods.
Journal Article
Data Aggregation Techniques Over Wireless Sensor Network- A Review
Shilpa S G,S. Meenakshi Sundaram +1 more
TL;DR: Data Aggregation is an efficient way to reduce the huge volume of data generated in WSNs by eliminating the redundancy among wireless sensor networks.
References
More filters
Journal ArticleDOI
The internet of things: a survey
TL;DR: The definitions, architecture, fundamental technologies, and applications of IoT are systematically reviewed and the major challenges which need addressing by the research community and corresponding potential solutions are investigated.
Journal ArticleDOI
Internet of Things in Industries: A Survey
Li Da Xu,Wu He,Shancang Li +2 more
TL;DR: This review paper summarizes the current state-of-the-art IoT in industries systematically and identifies research trends and challenges.
Journal ArticleDOI
Context Aware Computing for The Internet of Things: A Survey
TL;DR: This paper surveys context awareness from an IoT perspective and addresses a broad range of techniques, methods, models, functionalities, systems, applications, and middleware solutions related to context awareness and IoT.
Journal ArticleDOI
On the features and challenges of security and privacy in distributed internet of things
TL;DR: The purpose of this paper is to show that the distributed approach has various challenges that need to be solved, but also various interesting properties and strengths.
Journal ArticleDOI
A Survey of Intrusion Detection Systems in Wireless Sensor Networks
TL;DR: A survey of the state-of-the-art in Intrusion Detection Systems (IDSs) that are proposed for WSNs is presented, followed by the analysis and comparison of each scheme along with their advantages and disadvantages.