scholarly journals Analysis of P4 and XDP for IoT Programmability in 6G and Beyond

IoT ◽  
2020 ◽  
Vol 1 (2) ◽  
pp. 605-622
Author(s):  
David Carrascal ◽  
Elisa Rojas ◽  
Joaquin Alvarez-Horcajo ◽  
Diego Lopez-Pajares ◽  
Isaías Martínez-Yelmo

Recently, two technologies have emerged to provide advanced programmability in Software-Defined Networking (SDN) environments, namely P4 and XDP. At the same time, the Internet of Things (IoT) represents a pillar of future 6G networks, which will be also sustained by SDN. In this regard, there is a need to analyze the suitability of P4 and XDP for IoT. In this article, we aim to compare both technologies to help future research efforts in the field. For this purpose, we evaluate both technologies by implementing diverse use cases, assessing their performance and providing a quick qualitative overview. All tests and design scenarios are publicly available in GitHub to guarantee replication and serve as initial steps for researchers that want to initiate in the field. Results illustrate that currently XDP is the best option for constrained IoT devices, showing lower latency times, half the CPU usage, and reduced memory in comparison with P4. However, development of P4 programs is more straightforward and the amount of code lines is more similar regardless of the scenario. Additionally, P4 has a lot of potential in IoT if a special effort is made to improve the most common software target, BMv2.

Sensors ◽  
2020 ◽  
Vol 20 (12) ◽  
pp. 3459
Author(s):  
Yuhong Li ◽  
Xiang Su ◽  
Aaron Yi Ding ◽  
Anders Lindgren ◽  
Xiaoli Liu ◽  
...  

The Internet of Things (IoT) connects smart devices to enable various intelligent services. The deployment of IoT encounters several challenges, such as difficulties in controlling and managing IoT applications and networks, problems in programming existing IoT devices, long service provisioning time, underused resources, as well as complexity, isolation and scalability, among others. One fundamental concern is that current IoT networks lack flexibility and intelligence. A network-wide flexible control and management are missing in IoT networks. In addition, huge numbers of devices and large amounts of data are involved in IoT, but none of them have been tuned for supporting network management and control. In this paper, we argue that Software-defined Networking (SDN) together with the data generated by IoT applications can enhance the control and management of IoT in terms of flexibility and intelligence. We present a review for the evolution of SDN and IoT and analyze the benefits and challenges brought by the integration of SDN and IoT with the help of IoT data. We discuss the perspectives of knowledge-driven SDN for IoT through a new IoT architecture and illustrate how to realize Industry IoT by using the architecture. We also highlight the challenges and future research works toward realizing IoT with the knowledge-driven SDN.


2022 ◽  
pp. 132-148
Author(s):  
Kiran M. B. ◽  
Martin George Wynn

The Internet of Things (IoT) is formed by a set of physical objects with embedded sensors, connected using a network so that they can collect and exchange data. Though the concept looks simple, its deployment in industry has enormous potential to bring major business benefits and radical change. This chapter examines IoT technology and how it is being used in the corporate environment. Based on a review of existing literature and case examples, the various definitions and elements of IoT are discussed, followed by an assessment of how IoT is being used and what benefits are being delivered. Some key emergent themes are then examined – security aspects, the significance of 5G networks, and the need for an IoT strategy and project implementation guidelines. The chapter concludes by outlining possible areas for future research and suggests a step-change in the mega-infrastructure connecting IoT devices is imminent.


This theory has recently been expanded to IEEE 802.15.4 wireless networks, which constitute a key element of the Internet of Things (IoT). Nonetheless, the various patterns of traffic needed for SDN management make it difficult to adapt this method to these extremely demanding situations. Software-Defined Networking (SDN) key contribution of this work is the solution to network with IoT devices that enables network because of better functionalities in case of providing interfacesfor the layers. SDN enables significant advantages of applications to be created on the basis of interaction with traffic networks, trustable authentication, or service eminence. This report suggests the use of a SDN gateway as a decentralized platform to track traffic from IoT gadgets. The configured SDN gateway capable of detection the possible abnormal behaviors and provide it particularly valuable applicability for (obstructive, transmission or application of providing best services to the system).


2019 ◽  
Vol 20 (4) ◽  
pp. 607-630 ◽  
Author(s):  
Tausifa Jan Saleem ◽  
Mohammad Ahsan Chishti

The plethora of sensors deployed in Internet of Things (IoT) environments generate unprecedented volumes of data, thereby creating a data deluge. Data collected from these sensors can be used to comprehend, examine and control intricate environments around us, facilitating greater intelligence, smarter decision-making, and better performance. The key challenge here is how to mine out proficient information from such immense data. Copious solutions have been put forth to obtain valuable inferences and insights, however, these solutions are still in their developing stages. Moreover, conventional procedures do not address the surging analytical demands of IoT systems. Motivated to resolve this concern, this work investigates the key enablers for performing desired data analytics in IoT applications. A comprehensive survey on the identified key enablers including their role in IoT data analytics, use cases in which they have been applied and the corresponding IoT applications for the use cases is presented. Furthermore, open research challenges and future research opportunities are also discussed. This article can be used as a basis to foster advanced research in the arena of IoT data analytics.


Author(s):  
Andrew John Poulter ◽  
Steven J. Ossont ◽  
Simon J. Cox

This paper examines dynamic identity, as it pertains to the IoT; and explores the practical implementation of a mitigation to some of the key weaknesses of a conventional dynamic identity model. This paper explores human-centric and machine-based observer approaches for confirming device identity, permitting automated identity confirmation for deployed systems. It also assesses the advantages of dynamic identity in the context of identity revocation permitting secure change of ownership for IoT devices. The paper explores use-cases for human and machine-based observation for authentication of device identity when devices join a C2 network, and considers the relative merits for these two approaches for different types of system.


2012 ◽  
Vol 198-199 ◽  
pp. 1755-1760 ◽  
Author(s):  
Guo Ping Zhou ◽  
Ya Nan Chen

Applying the Internet of Things (IOT) into ecological environmental monitoring is the goal of this paper. There are several advantages of the Internet of Things (IOT) applying in ecological environment monitoring. A hierarchical monitoring system is presented, including system architecture, hardware/software design, information flow and software implementation. In the end, using carbon dioxide gas in the atmosphere for experimental purposes, in data collection and analysis. Experiments showed that this system is capable of monitoring ecologica environment, which orientate the future research of forest ecosystem.


2022 ◽  
Vol 54 (7) ◽  
pp. 1-34
Author(s):  
Sophie Dramé-Maigné ◽  
Maryline Laurent ◽  
Laurent Castillo ◽  
Hervé Ganem

The Internet of Things is taking hold in our everyday life. Regrettably, the security of IoT devices is often being overlooked. Among the vast array of security issues plaguing the emerging IoT, we decide to focus on access control, as privacy, trust, and other security properties cannot be achieved without controlled access. This article classifies IoT access control solutions from the literature according to their architecture (e.g., centralized, hierarchical, federated, distributed) and examines the suitability of each one for access control purposes. Our analysis concludes that important properties such as auditability and revocation are missing from many proposals while hierarchical and federated architectures are neglected by the community. Finally, we provide an architecture-based taxonomy and future research directions: a focus on hybrid architectures, usability, flexibility, privacy, and revocation schemes in serverless authorization.


2018 ◽  
Author(s):  
Henry Tranter

Security is always at the forefront of developing technologies. One can seldom go a week without hearing of a new data breach or hacking attempt from various groups around the world, often taking advantage of a simple flaw in a system’s architecture. The Internet of Things (IoT) is one of these developing technologies which may be at risk of such attacks. IoT devices are becoming more and more prevalent in everyday life. From keeping track of an individual’s health, to suggesting meals from items available in an individual’s fridge, these technologies are taking a much larger role in the personal lives of their users. With this in mind, how is security being considered in the development of these technologies? Are these devices that monitor individual’s personal lives just additional vectors for potential data theft? Throughout this survey, various approaches to the development of security systems concerning IoT devices in the home will be discussed, compared, and contrasted in the hope of providing an ideal solution to the problems this technology may produce.


Author(s):  
Clinton Fernandes ◽  
Vijay Sivaraman

This article examines the implications of selected aspects of the Telecommunications (Interception and Access) Amendment (Data Retention) Act 2015, which was passed by the Australian Parliament in March 2015. It shows how the new law has strengthened protections for privacy. However, focusing on the investigatory implications, it shows how the law provides a tactical advantage to investigators who pursue whistleblowers and investigative journalists. The article exposes an apparent discrepancy in the way ‘journalist’ is defined across different pieces of legislation. It argues that although legislators’ interest has been overwhelmingly focused on communications data, the explosion of data generated by the so-called Internet-of-Things (IoT) is as important or more. It shows how the sensors in selected IoT devices lead to a loss of user control and will enable non-stop, involuntary and ubiquitous monitoring of individuals. It suggests that the law will need to be amended further once legislators and investigators’ knowledge of the potential of IoT increases. 


Author(s):  
Tanweer Alam

In next-generation computing, the role of cloud, internet and smart devices will be capacious. Nowadays we all are familiar with the word smart. This word is used a number of times in our daily life. The Internet of Things (IoT) will produce remarkable different kinds of information from different resources. It can store big data in the cloud. The fog computing acts as an interface between cloud and IoT. The extension of fog in this framework works on physical things under IoT. The IoT devices are called fog nodes, they can have accessed anywhere within the range of the network. The blockchain is a novel approach to record the transactions in a sequence securely. Developing a new blockchains based middleware framework in the architecture of the Internet of Things is one of the critical issues of wireless networking where resolving such an issue would result in constant growth in the use and popularity of IoT. The proposed research creates a framework for providing the middleware framework in the internet of smart devices network for the internet of things using blockchains technology. Our main contribution links a new study that integrates blockchains to the Internet of things and provides communication security to the internet of smart devices.


Sign in / Sign up

Export Citation Format

Share Document