Proceedings ArticleDOI
IoTaaS based Approach to Design of a WSN for Secure Smart City Monitoring
Reads0
Chats0
TLDR
In this paper, the authors propose a new approach to designing a software for Digital City systems based on a knowledge model of distributed systems for design and testing of devices in the Digital City.Abstract:
The paper proposes a new approach to designing a software for Digital City systems. These systems are built on the basis of wireless sensor networks and implement Internet of Things as a Service (IoTaaS) concept. The approach is based on a proposed knowledge model of distributed systems for design and testing of devices in the Digital City. This approach comprises a specific service-oriented architecture and software prototypes of design and testing tools. The suggested approach increases the automation level of the development process of such systems. It will contribute to reducing time of the development process and operating costs of the developers. The peculiarities of the approach include the use of rules for the interconnection of particular hardware units, on the one hand, and ways of software devices modeling, on the other. Besides, the originality is in application of specific Digital City services by using virtualization tools.read more
References
More filters
Journal ArticleDOI
Transaction security system
TL;DR: An electronic funds transfer system (EFT) is described in which retail terminals located in stores are connected through a public switched telecommunication system to card issuing agencies data processing centers and users are issued with intelligent secure bank cards.
Proceedings ArticleDOI
IoT design space challenges: Circuits and systems
David Blaauw,Dennis Sylvester,Prabal Dutta,Yoonmyung Lee,Inhee Lee,Suyoung Bang,Yejoong Kim,Gyouho Kim,Pat Pannuto,Ye-Sheng Kuo,Dongmin Yoon,Wanyeong Jung,Zhiyoong Foo,Yen-Po Chen,Sechang Oh,Seokhyeon Jeong,Myungjoon Choi +16 more
TL;DR: This paper explores the IoT application space and identifies two common challenges that exist across this space: ultra-low power operation and system design using modular, composable components.
Proceedings ArticleDOI
Exploiting MMS Vulnerabilities to Stealthily Exhaust Mobile Phone's Battery
TL;DR: An attack is demonstrated, which surreptitiously drains mobile devices' battery power up to 22 times faster and therefore could render these devices useless before the end of business hours.
Journal ArticleDOI
Mobile Cloud-Based Big Healthcare Data Processing in Smart Cities
TL;DR: An ant colony optimization-based joint VM migration model for a heterogeneous, MCC-based Smart Healthcare system in Smart City environment is proposed and a thorough performance evaluation is presented to investigate the effectiveness of the proposed model compared with the state-of-the-art approaches.
Proceedings ArticleDOI
Effects of Wi-Fi and Bluetooth Battery Exhaustion Attacks on Mobile Devices
TL;DR: An insight into the ramifications of battery exhaustion Denial of Service (DoS) attacks on battery-powered mobile devices is provided and a hybrid Intrusion Detection System (IDS) designed to thwart this form of malicious activity is presented.
Related Papers (5)
Using a Use Case Methodology and an Architecture Model for Describing Smart City Functionalities
Marion Gottschalk,Mathias Uslar +1 more