scholarly journals A Smart Microcontroller Architecture for the Internet of Things

Sensors ◽  
2020 ◽  
Vol 20 (7) ◽  
pp. 1821 ◽  
Author(s):  
Zhenyu Wu ◽  
Kai Qiu ◽  
Jianguo Zhang

The interoperations of endpoint devices are generally achieved by gateways in Internet of Things (IoT) systems. However, the gateways mainly focus on networking communication, which is lack of data logic control capabilities. The microcontrollers with embedded intelligence could work as an intermediate device to help the interconnections of the endpoint devices. Moreover, they could help control the endpoint devices. In this paper, a microcontroller architecture with intelligent and scalable characteristics is proposed. The intelligence means that the microcontroller could control the target endpoint devices by its logical circuits, and the scalability means that the microcontroller architecture could be easily extended to deal with more complex problems. Two real world industrial implementations of the proposed architecture are introduced. The implementations show that the microcontroller is important to provide the intelligent services to users in IoT systems. Furthermore, a simulation experiment based on the cloud model is designed to evaluate the proposed method. The experimental results demonstrate the effectiveness of the proposed architecture.

2018 ◽  
Vol 2018 ◽  
pp. 1-30 ◽  
Author(s):  
Michele De Donno ◽  
Nicola Dragoni ◽  
Alberto Giaretta ◽  
Angelo Spognardi

The Internet of Things (IoT) revolution has not only carried the astonishing promise to interconnect a whole generation of traditionally “dumb” devices, but also brought to the Internet the menace of billions of badly protected and easily hackable objects. Not surprisingly, this sudden flooding of fresh and insecure devices fueled older threats, such as Distributed Denial of Service (DDoS) attacks. In this paper, we first propose an updated and comprehensive taxonomy of DDoS attacks, together with a number of examples on how this classification maps to real-world attacks. Then, we outline the current situation of DDoS-enabled malwares in IoT networks, highlighting how recent data support our concerns about the growing in popularity of these malwares. Finally, we give a detailed analysis of the general framework and the operating principles of Mirai, the most disruptive DDoS-capable IoT malware seen so far.


Author(s):  
Alex Mathew

There has been a rapid growth of the devices connected to the internet in the last decade for the various internet (IoT) of things applications. The increase of these smart devices has posed a great security concern in the internet of things ecosystem. The internet of things ecosystem must be protected from these threats. Reinforcement learning has been proposed by the cybersecurity professionals to provide the needed security tools for securing the IoT system since it is able to interact with the environment and learn how to detect the threats. This paper presents a comprehensive research on cybersecurity threats to the IoT system applications. The RL algorithms are also presented to understand the attacks on the IoT. Reinforcement learning is widely employed in cybersecurity because it can learn on its own experience by investigating and capitalizing on the unknown ecosystem, this enables it solve many complex problems. The RL capabilities on dealing with cybercrime challenges are also exploited in this paper.


Sensors ◽  
2019 ◽  
Vol 19 (7) ◽  
pp. 1492 ◽  
Author(s):  
Pantaleone Nespoli ◽  
David Useche Pelaez ◽  
Daniel Díaz López ◽  
Félix Gómez Mármol

The Internet of Things (IoT) became established during the last decade as an emerging technology with considerable potentialities and applicability. Its paradigm of everything connected together penetrated the real world, with smart devices located in several daily appliances. Such intelligent objects are able to communicate autonomously through already existing network infrastructures, thus generating a more concrete integration between real world and computer-based systems. On the downside, the great benefit carried by the IoT paradigm in our life brings simultaneously severe security issues, since the information exchanged among the objects frequently remains unprotected from malicious attackers. The paper at hand proposes COSMOS (Collaborative, Seamless and Adaptive Sentinel for the Internet of Things), a novel sentinel to protect smart environments from cyber threats. Our sentinel shields the IoT devices using multiple defensive rings, resulting in a more accurate and robust protection. Additionally, we discuss the current deployment of the sentinel on a commodity device (i.e., Raspberry Pi). Exhaustive experiments are conducted on the sentinel, demonstrating that it performs meticulously even in heavily stressing conditions. Each defensive layer is tested, reaching a remarkable performance, thus proving the applicability of COSMOS in a distributed and dynamic scenario such as IoT. With the aim of easing the enjoyment of the proposed sentinel, we further developed a friendly and ease-to-use COSMOS App, so that end-users can manage sentinel(s) directly using their own devices (e.g., smartphone).


Sensors ◽  
2019 ◽  
Vol 19 (7) ◽  
pp. 1600 ◽  
Author(s):  
Zheng Yao ◽  
Sentang Wu ◽  
Yongming Wen

Multi-agent hybrid social cognitive optimization (MAHSCO) based on the Internet of Things (IoT) is suggested to solve the problem of the generation of formations of unmanned vehicles. Through the analysis of the unmanned vehicle formation problem, formation principles, formation scale, unmanned vehicle formation safety distance, and formation evaluation indicators are taken into consideration. The application of the IoT enables the optimization of distributed computing. To ensure the reliability of the formation algorithm, the convergence of MAHSCO has been proved. Finally, computer simulation and actual unmanned aerial vehicle (UAV) formation generation flight generating four typical formations are carried out. The result of the actual UAV formation generation flight is consistent with the simulation experiment, and the algorithm performs well. The MAHSCO algorithm based on the IoT is proved to be able to generate formations that meet the mission requirements quickly and accurately.


Author(s):  
Martin Wolfe

This chapter is focused on the current and future state of operating a Hybrid Cloud or Internet of Things (IoT) environment. This includes tools, data, and processes which allow an organization to use these assets to serve business goals. Examining governance in this context shows how it works today and how it should change, using some real-world examples to show the impacts and advantages of these changes. It is a high level overview of those important topics with prescriptive detail left for a future and follow-on analysis. Finally, all of the lessons learned, when combined together form a governance fabric, resulting in a set of techniques and actions which tie together into a supporting framework and set of processes. The important questions include: Why does governance matter in the deployment and operation of Hybrid Cloud and IoT? If governance already exists how must it change? What are the important and salient characteristics of governance which need special focus? Thus, this analysis gives a context of how today's governance approach should change when moving to a Hybrid Cloud or IoT model.


2013 ◽  
Vol 475-476 ◽  
pp. 719-722
Author(s):  
Li Zhou

To solve site muck truck regulation difficulty, a muck truck monitoring system is designed and implemented based on 3G networks and the Internet of Things. The system consisted of Hi3515 processors embedded intelligence analyzer, RFID, grating and camera. With the data send from the construction site, a B/S remote regulatory website is built to provide real-time monitoring, evidence preservation, data analysis and data summary.


MACRo 2015 ◽  
2015 ◽  
Vol 1 (1) ◽  
pp. 25-36
Author(s):  
Béla Genge ◽  
Călin Enăchescu

AbstractThe expansion of Internet has led to a variety of directly accessible devices and services. Nowadays, companies tend to increase the number of Internetfacing services in order to ensure higher visibility, and accessibility towards end-users. Nonetheless, this profound expansion towards an “Internet of Things” brings new opportunities to malicious actors. As a result, novel cyber-physical attacks bring new challenges to systems administrators in order to accommodate traditional user requests with security prerequisites. Therefore, in this paper we propose a novel approach for historical Internet connectivity assessment of services. The technique uses the output of the popular Shodan search engine to infer the lifetime of different Internet-facing services. Experimental results conducted on IP address blocks attributed to six different institutions distributed across four sectors (university, telecommunications, banking, and power) show different possible service lifetime patterns.


Author(s):  
Dimitris Kelaidonis ◽  
Andrey Somov ◽  
Vassilis Foteinos ◽  
George Poulios ◽  
Vera Stavroulaki ◽  
...  

2017 ◽  
pp. 16-40
Author(s):  
Martin Wolfe

This chapter is focused on the current and future state of operating a Hybrid Cloud or Internet of Things (IoT) environment. This includes tools, data, and processes which allow an organization to use these assets to serve business goals. Examining governance in this context shows how it works today and how it should change, using some real-world examples to show the impacts and advantages of these changes. It is a high level overview of those important topics with prescriptive detail left for a future and follow-on analysis. Finally, all of the lessons learned, when combined together form a governance fabric, resulting in a set of techniques and actions which tie together into a supporting framework and set of processes. The important questions include: Why does governance matter in the deployment and operation of Hybrid Cloud and IoT? If governance already exists how must it change? What are the important and salient characteristics of governance which need special focus? Thus, this analysis gives a context of how today's governance approach should change when moving to a Hybrid Cloud or IoT model.


Sign in / Sign up

Export Citation Format

Share Document