Skip to main content
Log in

RETRACTED ARTICLE: Complex IoT Control System Modeling from Perspectives of Environment Perception and Information Security

  • Published:
Mobile Networks and Applications Aims and scope Submit manuscript

This article was retracted on 09 November 2022

This article has been updated

Abstract

Internet of Things (IoT) is an overall industry improvement that joins people, method, data, and things to make masterminded affiliations more critical and profitable than at whatever time in late memory. There are various issues in security of IOT yelling out for courses of action, for instance, RFID mark security, remote security, framework transmission security, security protection and the information that get ready security. The advances in some of the disseminated registering and the Internet of things (IOT) have given a promising opportunity to decide the troubles realized by the extending transportation issues and the author shows a novel multi-layered vehicular data cloud stage by using the basic appropriated processing and IOT propels. Two creative cloud advantages, a watchful ceasing cloud organization and vehicular data mining cloud organization, for vehicle ensure examination in the IoT situation are also given out. Troubles and direction for future work are also given. In this article, the author proposes Forum Alert Traffic Security (FATS) architecture in the Internet of Things (IOT) setting, which together studies development examination, security necessities, and action making arrangements for sight and sound applications.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

Change history

References

  1. Castelluccia C, Acf C, Mykletun E (2009) Efficient and provably secure aggregation of encrypted data in wireless sensor networks. ACM Transactions on Sensor Networks (TOSN) 5(3):20:1–20:36

    Article  Google Scholar 

  2. Nezhad AA, Miri A, Makrakis D (2008) Location privacy and anonymity preserving routing for wireless sensor networks. Comput Netw 52(18):3433–3452

    Article  MATH  Google Scholar 

  3. Dong Y, Chang H (2011) An energy conserving routing algorithm for wireless sensor networks. International Journal of Future Generation Communication and Networking, Washington 4(1):39–54

    Google Scholar 

  4. Atzori L, Iera A, Morabito G (2010) The internet of things: a survey. Comput Netw 54(15):2787–2805

    Article  MATH  Google Scholar 

  5. Chen SK, Kao T, Chan CT, Huang CN, Chiang CY, Lai CY et al (2012) A reliable transmission protocol for ZigBee-based wireless patient monitoring. IEEE Trans Inf Technol Biomed 16(1):6–16

    Article  Google Scholar 

  6. Li L (2013) Technology designed to combat fakes in the global supply chain. Bus Horizons 56(2):167–177

    Article  Google Scholar 

  7. Duan L, Xu LD (2012) Business intelligence for enterprise systems: a survey. IEEE Trans. Ind. Informat. 8(3):679–687

    Article  Google Scholar 

  8. M. Gerla (2012) Vehicular cloud computing. In: Proc. 11th IEEE Annu. Mediterranean Ad Hoc Netw. Workshop, Ayia Napa, Cyprus: 152–155

  9. Fang S, Xu L, Pei H, Liu Y, Liu Z, Zhu Y et al (2013) An integrated approach to snowmelt flood forecasting in water resource management. IEEE Trans Ind Informat 10(1):548–558

    Article  Google Scholar 

  10. Zeng L, Li L, Duan L (2012) Business intelligence in enterprise computing environment. Inf Technol Manag 13(4):297–310

    Article  Google Scholar 

  11. Ingvaldsen JE, Gulla JA (2012) Industrial application of semantic process mining. Enterprise Inf. Syst. 6(2):139–163

    Google Scholar 

  12. Xing Y, Li L, Bi Z (2013) Operations research (OR) in service industries: a comprehensive review. Syst Res Behav Sci 30:300–353

    Article  Google Scholar 

  13. Wan J, Jones JD (2011) Managing IT service management implementation complexity: from the perspective of the Warfield version of systems science. Enterprise Inf. Syst 7(4):490–522

    Google Scholar 

  14. Wang S, Li L, Wang K, Jones JD (2012) E-business systems integration: a systems perspective. Inf. Technol. Manag 13(4):233–249

    Google Scholar 

  15. Xu LD (2013) Introduction: systems science in industrial sectors. Syst Res Behav Sci 30(3):211–213

    Article  Google Scholar 

  16. Goggin G (2012) Driving the internet: mobile internets, cars, and the social. Future Internet 4(1):306–321

    Article  Google Scholar 

  17. Gubbi J, Buyya R, Marusic S, Palaniswami M (2013) Internet of things (IoT): A vision, architectural elements, and future directions. Future Gener Comput Syst 29(7):1645–1660

    Article  Google Scholar 

  18. Wang, Haoxiang, and Jingbin Wang (2014) An effective image representation method using kernel classification. 2014 I.E. 26th international conference on tools with artificial intelligence. IEEE

  19. Hsiao S-J, Lian K-Y, Sung W-T (2016) Employing cross-platform smart home control system with IOT technology based. Computer, Consumer and Control (IS3C), 2016 International symposium on. IEEE

  20. Kumar P, Pati UC (2016) IoT based monitoring and control of appliances for smart home. Recent Trends in Electronics, Information & Communication Technology (RTEICT), IEEE International Conference on. IEEE. doi:10.1109/RTEICT.2016.7808011

  21. Zhu F et al (2016) Parallel transportation management and control system and its applications in building smart cities. IEEE Trans Intell Transp Syst 17(6):1576–1585

    Article  Google Scholar 

  22. Li H et al (2015) Development of a remote monitoring system for henhouse environment based on IoT technology. Future Internet 7(3):329–341

    Article  Google Scholar 

  23. Hao Q et al (2015) Design of chemical industrial park integrated information management platform based on cloud computing and IOT (the internet of things) technologies. International Journal of Smart Home 9(4):35–46

    Article  Google Scholar 

  24. Breda GD, Cardoso RM, Pirotta FAC (2015) New era of mobile access control system. International Journal of Computer Science and Network Security (IJCSNS) 15(8):6

    Google Scholar 

  25. Han Y et al (2016) A smart home control system based on context and human speech. 2016 18th international conference on advanced communication technology (ICACT). IEEE

  26. Radley S, Shalini Punithavathani D (2016) Green computing in WAN through intensified teredo IPv6 tunneling to route multifarious symmetric NAT. Wirel Pers Commun 2(87):381–398

    Article  Google Scholar 

  27. Wang J et al (2015) Multiple kernel multivariate performance learning using cutting plane algorithm. Systems, Man, and Cybernetics (SMC), 2015 I.E. international conference on. IEEE

  28. Bi C, Wang H, Bao R (2014) SAR image change detection using regularized dictionary learning and fuzzy clustering. 2014 I.E. 3rd international conference on cloud computing and intelligence systems. IEEE

  29. Punithavathani DS, Radley S (2014) Performance analysis for wireless networks: an analytical approach by multifarious sym teredo. The Scientific World Journal

  30. Yan G, Wen D, Olariu S, Weigle MC (2013) Security challenges in vehicular cloud computing. IEEE Trans Intell Transp Syst 14(1):284–294

    Article  Google Scholar 

  31. Li S, Xu L, Wang X, Wang J (2012) Integration of hybrid wireless networks in cloud services oriented enterprise information systems. Enterprise Inf. Syst. 6(2):165–187

    Google Scholar 

  32. Kapoor A et al (2016) Implementation of IoT (Internet of Things) and image processing in smart agriculture. Computation system and information technology for sustainable solutions (CSITSS), international conference on. IEEE

  33. Chang, K-C et al (2016) Design of persimmon growing stage monitoring system using image recognition technique. Consumer Electronics-Taiwan (ICCE-TW), 2016 I.E. international conference on. IEEE

  34. Wu Z, Wang H (2016) Super-resolution Reconstruction of SAR Image based on Non-Local Means Denoising Combined with BP Neural Network. arXiv preprint arXiv:1612.04755

  35. Sun H et al (2016) CloudEyes: cloud-based malware detection with reversible sketch for resource-constrained internet of things (IoT) devices. Practice and Experience, Software

    Google Scholar 

  36. Hodo E et al (2016) Threat analysis of IoT networks using artificial neural network intrusion detection system. Networks, Computers and Communications (ISNCC), 2016 International symposium on. IEEE

  37. Majumder AJA, Saxena P, Ahamed SI (2016) Your walk is my command: gait detection on unconstrained smartphone using IoT system. Computer Software and Applications Conference (COMPSAC), 2016 I.E. 40th annual. Vol. 1. IEEE

  38. Walia NK, Kalra P, Mehrotra D (2016) An IOT by information retrieval approach: Smart lights controlled using WiFi. Cloud System and Big Data Engineering (Confluence), 2016 6th international conference. IEEE

  39. Wang H, Wang J (2014) An effective image representation method using kernel classification. 2014 I.E. 26th international conference on tools with artificial intelligence. IEEE

  40. Kim J-E et al (2016) On maximizing quality of information for the internet of things: a real-time scheduling perspective. Embedded and Real-Time Computing Systems and Applications (RTCSA), 2016 I.E. 22nd international conference on. IEEE

Download references

Acknowledgements

This work is supported by the National Natural Science Foundation of China (No.61473108).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yinglong Ge.

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Ge, Y., Zhang, X. & Han, B. RETRACTED ARTICLE: Complex IoT Control System Modeling from Perspectives of Environment Perception and Information Security. Mobile Netw Appl 22, 683–691 (2017). https://doi.org/10.1007/s11036-017-0846-5

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11036-017-0846-5

Keywords

Navigation