Open Access Open Access  Restricted Access Subscription or Fee Access

Applications for Innovative Internet of Things Using Smart Surveillance System

A. Premkumar, K. Manivannan, J. Ashok Kumar, C.R. Raja Vignesh

Abstract


In  the logistics  and  supply  chain,  the  traditional  supply  of  goods  is  based  on  established agreements  between  manufacturers  and  suppliers.    Orders  are  made  in  advance  and tracking   is   done   by   various   stakeholders   in   the   supply   chain,   i.e.,   assembly   lines, manufacturers  and  logistics  managers.    With  the  use  of  smart  technologies  such  as  active RFID  (executable  codes  in  tag),  it  is  possible  to  envision  that  goods  may  be  transported without  human  intervention  from manufacturers to suppliers. Warehouses  will  become completely automatic with goods moving in and out; forwarding of the goods will be made, using  intelligent  decisions  based  on  information  received  via  readers  and  positioning systems  to  optimise  transiting  routes The concept of Internet of Things (IoT) has become the most popular term through the widespread of its applications such as greenhouse and telemedicine monitoring. Actually, building IoT systems requires an accurate infrastructure planning. Furthermore, management and security of these systems are considered as the most important challenges facing system developers. As security will be a fundamental enabling factor of most IoT applications, mechanisms must also be designed to protect communications enabled by such technologies. This survey analyses existing protocols and mechanisms to secure communications in the IoT, as well as open research issues. We analyse how existing approaches ensure fundamental security requirements and protect communications on the IoT, together with the open challenges and strategies for future research work in the area. This is, as far as our knowledge goes, the first survey with such goals. In this paper, the traditional techniques are studied and evaluated. Accordingly, analysis and design of innovative general purpose system, which protect the IoT resources such as devices and data against hacking or stealing, are proposed.

Keywords


Internet of Things, End-to-End Security, Network Security, QoS, Internetworking.

Full Text:

PDF

References


Luigi A., Antonio I., Giacomo M., The Internet of Things: A survey. Science Direct journal of Computer Networks, Volume 54, Pages: 2787–2805, 2010.

Yinghui H., Guanyu L., Descriptive Models for Internet of Things. IEEE International Conference on Intelligent Control and Information Processing, Pages: 483- 486, Dalian, China, 2010.

Yuxi Liu, Guohui Zhou, Key Technologies and Applications of Internet of Things, IEEE Fifth International Conference on Intelligent Computation Technology and Automation, Hunan China, Pages: 197-200, 2012.

Huansheng N., Ziou Wang, Future Internet of Things Architecture: Like Mankind Neural System or Social Organization Framework, IEEE Communication Letters, Vol. 15, No. 4, Pages: 461, 2011.

Junwei Lv, 11, Xiaohu Yuan and Haiyan Li, "A New Clock Synchronization Architecture of Network for Internet of Things", International Conference on Information Science and Technology, Pages: 685-688, Jiangsu, China, March 26-28, 2011.

Castro, M. et. al., "Oxygen Cylinders Management Architecture Based on Internet of Things", International Conference on computational science and its applications (ICCSA), Pages: 271-274, Murica, Spain, 2011.

Miao W., Ting L., Fei L., ling S., Hui D., Research on the architecture of Internet of things. IEEE International Conference on Advanced Computer Theory and Engineering (ICACTE), Sichuan province, China, Pages: 484-487, 2010.

Neil Bergmann, Peter J. Robinson, Server-Based Internet of Things Architecture, 9th Annual IEEE Consumer Communications and Networking Conference, Brisbane, Australia, Pages: 360 – 361, China, 2012.

Jing Liu and Yang Xiao, C. L. Philip Chen, "Authentication and Access Control in the Internet of Things", International Conference on Distributed Computing Systems Workshops, Pages: 588 – 592, Tuscaloosa, AL, USA, 18-21 June, 2012.

Lan Li, "Study on Security Architecture in the Internet of Things", IEEE International Conference on Measurement, Information and Control (MIC), Pages: 374 – 377, Harbin, China, 18-20 May, 2012.

Wei Jiang, Limin Meng, Design of Real Time Multimedia platform and Protocol to the Internet of Thing, IEEE International Conference on Trust, Security and Privacy in Computing and Communications, Pages: 1805 – 1810, Liverpool, United Kingdom, 25-27 June 2012.

ShaoXiwen, "Study on Security Issue of Internet of Things based on RFID", IEEE International Conference on Computational and Information Sciences, Pages: 566 – 569, Chongqing, China, 17-19 Aug. 2012.

Uckelmann, Dieter; Harrison, Mark; Michahelles, Florian, "Architecting the Internet of Things", Springer, 2011. ISBN 978- 3-642-19156-5.ww.cui.cn/.../Linux/Architecting_the_Internet_of_Things.pdf

Xiong Li, Zhou Xuan,Liu Wen, "Research on the Architecture of Trusted Security System Based on the Internet of Things", IEEE International Conference on Intelligent Computation Technology and Automation, Pages: 1172-1175, Shenzhen , China, 28-29 March, 2011.

Arijit Ukil, Jaydip Sen, Sripad Koilakonda, "EmbeddedSecurity for Internet of Things", IEEE International Conference on Emerging Trends and Applications in Computer Science (NCETACS), Pages:1-6, Kolkata, India, 4 - 5 March 2011.


Refbacks

  • There are currently no refbacks.