Explore chapters and articles related to this topic
Access Control Methods in Cloud Enabledthe Cloud-Enabled Internet of Things
Published in N. Jeyanthi, Kun Ma, Thinagaran Perumal, R. Thandeeswaran, Managing Security Services in Heterogenous Networks, 2020
B. Ravinder Reddy, T. Adilakshmi, C. Pavan Kumar
Xu et al. [11] proposed a four-layered architecture for IoT comprising the following:Sensing Layer – Acts as an interface between the physical world and cyber world, sensing and collecting data with the help of sensors, cameras, radio frequency identification (RFID), etc.Networking Layer – Provides networking support for data transmission and collection and control applications.Service Layer – Acts as middleware to support business logic and service integration.Interface Layer – Provides an interface to seamlessly integrate the service layer with end users.
A Layered Internet of Things (IoT) Security Framework: Attacks, Counter Measures and Challenges
Published in Sanjay Kumar Biswash, Sourav Kanti Addya, Cloud Network Management, 2020
Umang Garg, Preeti Mishra, R.C. Joshi
The service layer is a kind of middleware that is an enabler of services and applications. This layer is designed to provide a common platform to the applications of IoT with common application programming interfaces (APIs) and protocols [64]. The main responsibilities of this layer include information storage, data processing, analytics services, integration of services, and event processing, etc. To enable any service with an application of IoT, the following components are used: service discovery, service composition, and service APIs, and trust management [222]. Some main actors of this layer are cloud services, back-end services, database and storage management, and data storage components. Some vulnerabilities of this layer are the reliability of service, insecure cryptography, data protection, and Internet dependency. The security requirement of this layer includes authorization, service authentication, privacy protection, anti-replay, and availability. Data loss and modifications, VM escape, malicious VM creation, insecure VM migrations, and brute force attacks are some attacks that may occur at this layer [271]. To handle these attacks, some of the techniques can be applied such as backup and retention, trusted cloud computing, mirage, VNSS, and site scanner [248].
Developing and Testing of Software for Wireless Sensor Networks
Published in Richard Zurawski, Networked Embedded Systems, 2017
Jan Blumenthal, Frank Golatowski, Ralf Behnke, Steffen Pruter, Dirk Timmermann
It is quite hard or even impossible to meet the requirements mentioned above with a monolithic application. Hence, at present there is much research effort in the areas of middleware and service architectures for wireless sensor networks. A middleware for wireless sensor networks should encapsulate required functionality in a layer between OS and application. Incorporating a middleware layer has the advantage that applications get smaller and are not tied to a specific microcontroller. At the same time, development effort for sensor node applications (SNA) reduces since a significant part of the functionality moves from application to middleware. Another research domain tends to service architectures for wireless sensor networks. A service layer is based on mechanisms of a middleware layer and makes its functionality more usable.
Next generation integrated smart manufacturing based on big data analytics, reinforced learning, and optimal routes planning methods
Published in International Journal of Computer Integrated Manufacturing, 2019
Chang Liu, Hanying Li, Yuwei Tang, Dongtao Lin, Jiawei Liu
Finally, compared with the same industry, Visualization Service (VC) is an effective way to improve customer experience and enhance market competitiveness. VC is applicable to the entire operation such as order tracking, quality monitoring, and status reporting. At the basic level, VC consists of the server system, data acquisition system, database system and disaster recovery system. The data acquisition system is responsible for collecting data throughout the entire process through GPS, GIS, RFID and other sensors and monitors. The service layer includes directory service, search and tracking service, information distribution service, and workflow service. It can be used to identify, inquire and retrieve the laundry fabric. It can also track and trace all the information of the process which is accessible to customers on request. The next layer is a collaborative layer, featuring data exchange service management and service management, which mainly manages the data servers, data types, data nodes, user routes, user protocols, and data availability etc., and ensures the synchronization of data updates. Finally, the Application layer is the interface for hotel managers and laundry operators of all modules. It works in two different ways. For internal operators at different modules, it publishes the corresponding information constantly, while it releases information to the calling devices on request for hotel managers.