skip to main content
10.1145/3141128.3141141acmotherconferencesArticle/Chapter ViewAbstractPublication PagesiccbdcConference Proceedingsconference-collections
research-article

Critical data and security level of Internet of Things (IoT), with emphasis on data structures

Published: 17 September 2017 Publication History

Abstract

Data Hungry mobile devices, critical automation industry fields cast need for ready and unique sensing and measurement processes. These are enabled by devices named Mobile Wireless Sensor Network (MWSN) that cuts across almost every field of our current lives. Also, it puts a challenge to the protocols to measure, deduct environmental pointers, from computing hardware set ups to delicate ecologies and natural resources to urban environments. The proliferation of these devices in a communicating-function network creates the Internet of Things (IoT)[1].

References

[1]
J. Gubbi, et al., "Internet of Things (IoT): A vision, architectural elements, and future directions," Future generation computer systems, vol. 29, pp. 1645--1660, 2013.
[2]
A. Juels, "RFID security and privacy," ed: Springer, 2012.
[3]
F. A. Aoudia, et al., "A Generic Framework for Modeling MAC Protocols in Wireless Sensor Networks," IEEE/ACM Transactions on Networking, 2016.
[4]
M. Z. Hasan, et al., "A Survey on Multipath Routing Protocols for QoS Assurances in Real-Time Wireless Multimedia Sensor Networks," IEEE Communications Surveys & Tutorials, 2017.
[5]
M. P. Bakht and A. A. Shaikh, "Routing Techniques in Wireless Sensor Networks: Review and Survey," Journal of Applied and Emerging Sciences, vol. 6, pp. pp 18--23, 2016.
[6]
S. B. Amsalu, et al., "Design and performance evaluation of an energy efficient routing protocol for Wireless Sensor Networks," in 2016 Annual Conference on Information Science and Systems (CISS), 2016, pp. 48--53.
[7]
A. Botta, et al., "Integration of cloud computing and internet of things: a survey," Future generation computer systems, vol. 56, pp. 684--700, 2016.
[8]
G. Urzaiz, et al., "The Advanced Network of Things: A Middleware to Provide Enhanced Performance and Functionality in IoT," in Ubiquitous Computing and Ambient Intelligence: 10th International Conference, UCAmI 2016, San Bartolomé de Tirajana, Gran Canaria, Spain, November 29-December 2, 2016, Part II 10, 2016, pp. 284--294.
[9]
V. Negi. (2014). Available: https://www.slideshare.net/vikrantnegi007/internet-of-things-seminar
[10]
Hype Cycle Available: https://en.wikipedia.org/wiki/Hype_cycle
[11]
S. K. Sudarshan, et al., "A Comprehensive Study of Mobile Sensing and Cloud Services."
[12]
N. Streitz and P. Markopoulos, Distributed, Ambient and Pervasive Interactions: 4th International Conference, DAPI 2016, Held as Part of HCI International 2016, Toronto, ON, Canada, July 17-22, 2016, Proceedings vol. 9749: Springer, 2016.
[13]
L.-j. GAO and Z.-g. CHEN, "Security in Next-Generation Wireless Sensor Networks."
[14]
A. Woo and D. E. Culler, "A transmission control scheme for media access in sensor networks," in Proceedings of the 7th annual international conference on Mobile computing and networking, 2001, pp. 221--235.
[15]
D. A. Herr, et al., "Protocol selection for transmission control protocol/internet protocol (tcp/ip)," ed: Google Patents, 2015.
[16]
L. Atzori, et al., "The internet of things: A survey," Computer networks, vol. 54, pp. 2787--2805, 2010.
[17]
G. S. Tomar, et al., The Human Element of Big Data: Issues, Analytics, and Performance: CRC Press, 2016.
[18]
S. Li, et al., "The internet of things: a survey," Information Systems Frontiers, vol. 17, p. 243, 2015.
[19]
A. Crooks, et al., "creating smart Buildings and cities," IEEE Pervasive Computing, vol. 16, pp. 23--25, 2017.
[20]
E. Shih, et al., "Physical layer driven protocol and algorithm design for energy-efficient wireless sensor networks," in Proceedings of the 7th annual international conference on Mobile computing and networking, 2001, pp. 272--287.
[21]
W. Ye, et al., "An energy-efficient MAC protocol for wireless sensor networks," in INFOCOM 2002. Twenty-first annual joint conference of the IEEE computer and communications societies. Proceedings. IEEE, 2002, pp. 1567--1576.

Index Terms

  1. Critical data and security level of Internet of Things (IoT), with emphasis on data structures

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    ICCBDC '17: Proceedings of the 2017 International Conference on Cloud and Big Data Computing
    September 2017
    135 pages
    ISBN:9781450353434
    DOI:10.1145/3141128
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    In-Cooperation

    • Northumbria University: University of Northumbria at Newcastle

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 17 September 2017

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. Cloud Computing
    2. Internet Security
    3. IoT
    4. NoT

    Qualifiers

    • Research-article
    • Research
    • Refereed limited

    Conference

    ICCBDC 2017

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • 0
      Total Citations
    • 158
      Total Downloads
    • Downloads (Last 12 months)0
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 03 Mar 2025

    Other Metrics

    Citations

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media