scholarly journals Object Classification based Context Management for Identity Management in Internet of Things

2013 ◽  
Vol 63 (12) ◽  
pp. 1-6 ◽  
Author(s):  
Parikshit N.Mahalle ◽  
Neeli Rashmi Prasad ◽  
Ramjee Prasad
Author(s):  
Leonardo J. Gutierrez ◽  
Kashif Rabbani ◽  
Oluwashina Joseph Ajayi ◽  
Samson Kahsay Gebresilassie ◽  
Joseph Rafferty ◽  
...  

The increase of mental illness cases around the world can be described as an urgent and serious global health threat. Around 500 million people suffer from mental disorders, among which depression, schizophrenia, and dementia are the most prevalent. Revolutionary technological paradigms such as the Internet of Things (IoT) provide us with new capabilities to detect, assess, and care for patients early. This paper comprehensively survey works done at the intersection between IoT and mental health disorders. We evaluate multiple computational platforms, methods and devices, as well as study results and potential open issues for the effective use of IoT systems in mental health. We particularly elaborate on relevant open challenges in the use of existing IoT solutions for mental health care, which can be relevant given the potential impairments in some mental health patients such as data acquisition issues, lack of self-organization of devices and service level agreement, and security, privacy and consent issues, among others. We aim at opening the conversation for future research in this rather emerging area by outlining possible new paths based on the results and conclusions of this work.


2020 ◽  
Author(s):  
Liming Wang ◽  
Hongqin Zhu ◽  
Jiawei Sun ◽  
Ran Dai ◽  
Qi Ma ◽  
...  

Abstract Since IoT devices are strengthened, edge computing with multi-center cooperation becomes a trend. Considering that edge nodes may belong to different center, they have different trust management model, it’s hard to assess trust among edge nodes. In this paper, we take blockchain to coordinate differences among centers, construct a trust environment for transactions in IoT. In detail, we propose a blockchain based identity management for IoT to ensure identity is credible, then design a transaction model to provide certification for IoT transactions. And, we take machine learning methods to analyze IoT transaction log, thus decide trust nodes or not. Experiment results show that our mechanism could effectively identify trustworthy edges in IoT.


Author(s):  
Anang Hudaya Muhamad Amin ◽  
Fred N. Kiwanuka ◽  
Nabih T. J. Abdelmajid ◽  
Saif Hamad AlKaabi ◽  
Sultan Khalid Abdulqader Rashed Ahli

Internet of things (IoT) is in the forefront of many existing smart applications, including autonomous systems and green technology. IoT devices have been commonly used in the monitoring of energy efficiency and process automation. As the application spreads across different kinds of applications and technology, a large number of IoT devices need to be managed and configured, as they are capable of generating massive amount of sensory data. Looking from this perspective, there is a need for a proper mechanism to identify each IoT devices within the system and their respective applications. Participation of these IoT devices in complex systems requires a tamper-proof identity to be generated and stored for the purpose of device identification and verification. This chapter presents a comprehensive approach on identity management of IoT devices using a composite identity of things (CIDoT) with permissioned blockchain implementation. The proposed approach described in this chapter takes into account both physical and logical domains in generating the composite identity.


Author(s):  
Jean-Paul Arcangeli ◽  
Amel Bouzeghoub ◽  
Valérie Camps ◽  
Marie-Françoise Canut ◽  
Sophie Chabridon ◽  
...  

Author(s):  
Sophie Chabridon ◽  
Romain Laborde ◽  
Thierry Desprats ◽  
Arnaud Oglaza ◽  
Pierrick Marie ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document