scholarly journals Sensor Virtualization Module: Virtualizing IoT Devices on Mobile Smartphones for Effective Sensor Data Management

2015 ◽  
Vol 2015 ◽  
pp. 1-10 ◽  
Author(s):  
JeongGil Ko ◽  
Byung-Bog Lee ◽  
Kyesun Lee ◽  
Sang Gi Hong ◽  
Naesoo Kim ◽  
...  

The vision of theInternet of Things (IoT)is coming closer to reality as a large number of embedded devices are introduced to our everyday environments. For many commercial IoT devices, ubiquitously connected mobile platforms can provide global connectivity and enable various applications. Nevertheless, the types of IoT resource-utilizing applications are still limited due to the traditional stovepipe software architecture, where the vendors provide supporting software on an end-to-end basis. This paper tries to address this issue by introducing theSensor Virtualization Module (SVM), which provides a software abstraction for external IoT objects and allows applications to easily utilize various IoT resources through open APIs. We implement the SVM on both Android and iOS and show that the SVM architecture can lead to easy development of applications. We envision that this simplification in application development will catalyze the development of various IoT services.

2016 ◽  
Vol 2016 ◽  
pp. 1-17 ◽  
Author(s):  
Mihui Kim ◽  
Mihir Asthana ◽  
Siddhartha Bhargava ◽  
Kartik Krishnan Iyyer ◽  
Rohan Tangadpalliwar ◽  
...  

The increasing number of Internet of Things (IoT) devices with various sensors has resulted in a focus on Cloud-based sensing-as-a-service (CSaaS) as a new value-added service, for example, providing temperature-sensing data via a cloud computing system. However, the industry encounters various challenges in the dynamic provisioning of on-demand CSaaS on diverse sensor networks. We require a system that will provide users with standardized access to various sensor networks and a level of abstraction that hides the underlying complexity. In this study, we aim to develop a cloud-based solution to address the challenges mentioned earlier. Our solution, SenseCloud, includes asensor virtualizationmechanism that interfaces with diverse sensor networks, amultitenancymechanism that grants multiple users access to virtualized sensor networks while sharing the same underlying infrastructure, and adynamic provisioningmechanism to allow the users to leverage the vast pool of resources on demand and on a pay-per-use basis. We implement a prototype of SenseCloud by using real sensors and verify the feasibility of our system and its performance. SenseCloud bridges the gap between sensor providers and sensor data consumers who wish to utilize sensor data.


Author(s):  
Syed Farid Syed Adnan ◽  
Mohd Anuar Mat Isa ◽  
Habibah Hashim

<p>The revolution of the Internet of Things (IoT) has given a better way of monitoring things including anything that could gather data and share the information over the internet. Most of the connected things are using Device to Device (D2D) connection to make it available on the internet such as client to a broker or client to a server. However, when IoT devices such as embedded devices and sensors that are connected to the internet, it becomes an open path for attackers to acquire the data and data vulnerably will become an issue. Thus, data integrity might become an issue, or the attackers could temper the data and could cause a disastrous domino effect to the interconnected IoT devices. Therefore, the data security collected from the sensors is substantial even though it could be a single character transmitted. However, IoT sensors are low powered devices in term of CPU, storage, memory and batteries. Securing the devices such as integrating the encryption algorithm computations might give overhead to the sensors and draining the batteries even faster than it is predicted. Alternatively, this paper attempts to explore the capabilities of the asymmetric scheme on resource constrained devices for its communications. Thus, this paper presents an RF communication analysis of a low consumption asymmetric encryption, the AA<sub>β</sub> (AA-Beta) especially on encryption section that is likely to be feasible on IoT devices to preserve the data integrity. The design of RF transmission has been considered to suit the RF transceiver capability to prevent data losses and error from occurring. The result shows that 2.35 times of RF transmits runtime increased compared to RF simulation runtime. Meanwhile, at the receiver side, the runtime increases 60% compared to the simulation.</p>


Sign in / Sign up

Export Citation Format

Share Document