Skip to main content
Erschienen in: Wireless Personal Communications 1/2016

01.01.2016

Safe Data Transmission Architecture Based on Cloud for Internet of Things

verfasst von: Seokhoon Kim, Wonshik Na

Erschienen in: Wireless Personal Communications | Ausgabe 1/2016

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Nowadays, cloud computing technology, and IoT technology are one of the inevitable core trends. These technologies are key technology of various ICT convergence services, and it will create a value-added business and market. Although it is in its infancy, there is no doubt that it will be a game changer. However, cloud computing technology and IoT technology have some limitations especially in openness and standardization because they have been independently evolved. This is why they expose some weak-points, which are difficult to expand to various services, and it also has some problems to interwork other devices or services. In the safe network case, current safe network service has a restriction because it is based on closed networks. In addition, the key technology in the safe networking has an independent scheme or architecture. Due to the fact that we need new architecture to integrate entire networks, there are no certain alternatives so far. It is because most of related works are focused on the providing to just the safety in the networks. To solve these problems, we propose a safe data transmission architecture for the IoT ecosystems. The proposed architecture is a kind of software defined network base cloud, and it can provide the safe data transmission with QoS/QoE. Basically, the proposed architecture has three states, install, start and working, and four phase, negotiation, initialization, configuration and execution. In the install state, the devices set some parameters such as a synchronization time between node in cloud and IoT device. Based on the install state, data transmission will be started in the start state. In the start state, the nodes start data transmission by the set parameters in the install state. And then, the nodes keep the working state. However, it can be changed whenever user’s request to upgrade the transmission security. The proposed architecture has some enhanced synchronization algorithms to provide a safe data transmission and to guarantee a QoS/QoE. Based on the architecture, we verified that the proposed architecture outperforms than legacy architectures in various aspects, and we are shown these simulation results by using OPNET.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Prasad, A. S., & Rao, S. (2014). A mechanism design approach to resource procurement in cloud computing. IEEE Transactions on Computers, 63(1), 17–30.CrossRefMathSciNet Prasad, A. S., & Rao, S. (2014). A mechanism design approach to resource procurement in cloud computing. IEEE Transactions on Computers, 63(1), 17–30.CrossRefMathSciNet
2.
Zurück zum Zitat Qu, L., Wang, Y., Orgun, M. A., Liu, L., Liu, H., & Bouguettaya, A. (2015). CCCloud: Context-aware and credible cloud service selection based on subjective assessment and objective assessment. IEEE Transactions on Services Computing, 8(3), 369–383.CrossRef Qu, L., Wang, Y., Orgun, M. A., Liu, L., Liu, H., & Bouguettaya, A. (2015). CCCloud: Context-aware and credible cloud service selection based on subjective assessment and objective assessment. IEEE Transactions on Services Computing, 8(3), 369–383.CrossRef
3.
Zurück zum Zitat Yin, Z., Yu, F. R., Bu, S., & Han, Z. (2015). Joint cloud and wireless networks operations in mobile cloud computing environments with telecom operator cloud. IEEE Transactions on Wireless Communications, 14(7), 4020–4033.CrossRef Yin, Z., Yu, F. R., Bu, S., & Han, Z. (2015). Joint cloud and wireless networks operations in mobile cloud computing environments with telecom operator cloud. IEEE Transactions on Wireless Communications, 14(7), 4020–4033.CrossRef
4.
Zurück zum Zitat Wang, S., & Dey, S. (2013). Adaptive mobile cloud computing to enable rich mobile multimedia applications. IEEE Transactions on Multimedia, 15(4), 870–883.CrossRef Wang, S., & Dey, S. (2013). Adaptive mobile cloud computing to enable rich mobile multimedia applications. IEEE Transactions on Multimedia, 15(4), 870–883.CrossRef
5.
Zurück zum Zitat Abolfazli, S., Sanaei, Z., Ahmed, E., Gani, A., & Buyya, R. (2014). Cloud-based augmentation for mobile devices: Motivation, taxonomies, and open challenges. IEEE Communications Surveys & Tutorials, 16(1), 337–368.CrossRef Abolfazli, S., Sanaei, Z., Ahmed, E., Gani, A., & Buyya, R. (2014). Cloud-based augmentation for mobile devices: Motivation, taxonomies, and open challenges. IEEE Communications Surveys & Tutorials, 16(1), 337–368.CrossRef
6.
Zurück zum Zitat Parashar, M., AbdelBaky, M., Rodero, I., & Devarakonda, A. (2013). Cloud paradigms and practices for computational and data-enabled science and engineering. Computing in Science & Engineering, 15(4), 10–18.CrossRef Parashar, M., AbdelBaky, M., Rodero, I., & Devarakonda, A. (2013). Cloud paradigms and practices for computational and data-enabled science and engineering. Computing in Science & Engineering, 15(4), 10–18.CrossRef
7.
Zurück zum Zitat Pandey, V., Singh, S., & Tapaswi, S. (2015). Energy and time efficient algorithm for cloud offloading using dynamic profiling. Wireless Personal Communications, 80(4), 1687–1701.CrossRef Pandey, V., Singh, S., & Tapaswi, S. (2015). Energy and time efficient algorithm for cloud offloading using dynamic profiling. Wireless Personal Communications, 80(4), 1687–1701.CrossRef
8.
Zurück zum Zitat Wang, Y., Chen, I.-R., & Wang, D.-C. (2015). A survey of mobile cloud computing applications: Perspectives and challenges. Wireless Personal Communications, 80(4), 1607–1623.CrossRef Wang, Y., Chen, I.-R., & Wang, D.-C. (2015). A survey of mobile cloud computing applications: Perspectives and challenges. Wireless Personal Communications, 80(4), 1607–1623.CrossRef
9.
Zurück zum Zitat Kim, S., Kim, G.-J., & Chung, K.-Y. (2014). Performance analysis of non-PC/SC based mini-WiMAX connection manager. Cluster Computing, 17(3), 775–789.CrossRef Kim, S., Kim, G.-J., & Chung, K.-Y. (2014). Performance analysis of non-PC/SC based mini-WiMAX connection manager. Cluster Computing, 17(3), 775–789.CrossRef
10.
Zurück zum Zitat Xu, B., Da Xu, L., Cai, H., Xie, C., Hu, J., & Bu, F. (2014). Ubiquitous data accessing method in IoT-based information system for emergency medical services. IEEE Transactions on Industrial Informatics, 10(2), 1578–1586.CrossRef Xu, B., Da Xu, L., Cai, H., Xie, C., Hu, J., & Bu, F. (2014). Ubiquitous data accessing method in IoT-based information system for emergency medical services. IEEE Transactions on Industrial Informatics, 10(2), 1578–1586.CrossRef
11.
Zurück zum Zitat Papagianni, C., Leivadeas, A., Papavassiliou, S., Maglaris, V., Cervello-Pastor, C., & Monje, A. (2013). On the optimal allocation of virtual resources in cloud computing networks. IEEE Transactions on Computers, 62(6), 1060–1071.CrossRefMathSciNet Papagianni, C., Leivadeas, A., Papavassiliou, S., Maglaris, V., Cervello-Pastor, C., & Monje, A. (2013). On the optimal allocation of virtual resources in cloud computing networks. IEEE Transactions on Computers, 62(6), 1060–1071.CrossRefMathSciNet
12.
Zurück zum Zitat Jarschel, M., Zinner, T., Hossfeld, T., Tran-Gia, P., & Kellerer, W. (2014). Interfaces, attributes, and use cases: A compass for SDN. IEEE Communications Magazine, 52(6), 210–217.CrossRef Jarschel, M., Zinner, T., Hossfeld, T., Tran-Gia, P., & Kellerer, W. (2014). Interfaces, attributes, and use cases: A compass for SDN. IEEE Communications Magazine, 52(6), 210–217.CrossRef
13.
Zurück zum Zitat Kyoseva, T., Poulkov, V., Mihaylov, M., & Mihovska, A. (2014). Disruptive innovations as a driving force for the change of wireless telecommunication infrastructures. Wireless Personal Communications, 78(3), 1683–1697.CrossRef Kyoseva, T., Poulkov, V., Mihaylov, M., & Mihovska, A. (2014). Disruptive innovations as a driving force for the change of wireless telecommunication infrastructures. Wireless Personal Communications, 78(3), 1683–1697.CrossRef
14.
Zurück zum Zitat Miao, W., Agraz, F., Peng, S., Spadaro, S., Bernini, G., Perello, J., … Calabretta, N. (2015). SDN-enabled OPS with QoS guarantee for reconfigurable virtual data center networks. IEEE/OSA Journal of Optical Communications and Networking, 7(7), 634–643.CrossRef Miao, W., Agraz, F., Peng, S., Spadaro, S., Bernini, G., Perello, J., … Calabretta, N. (2015). SDN-enabled OPS with QoS guarantee for reconfigurable virtual data center networks. IEEE/OSA Journal of Optical Communications and Networking, 7(7), 634–643.CrossRef
15.
Zurück zum Zitat Tomovic, S., Pejanovic-Djurisic, M., & Radusinovic, I. (2014). SDN based mobile networks: Concepts and benefits. Wireless Personal Communications, 78(3), 1629–1644.CrossRef Tomovic, S., Pejanovic-Djurisic, M., & Radusinovic, I. (2014). SDN based mobile networks: Concepts and benefits. Wireless Personal Communications, 78(3), 1629–1644.CrossRef
16.
Zurück zum Zitat Bontu, C. S., Periyalwar, S., & Pecen, M. (2014). Wireless wide-area networks for internet of things: An air interface protocol for IoT and a simultaneous access channel for uplink IoT communication. IEEE Vehicular Technology Magazine, 9(1), 54–63.CrossRef Bontu, C. S., Periyalwar, S., & Pecen, M. (2014). Wireless wide-area networks for internet of things: An air interface protocol for IoT and a simultaneous access channel for uplink IoT communication. IEEE Vehicular Technology Magazine, 9(1), 54–63.CrossRef
17.
Zurück zum Zitat oneM2M. (2014). oneM2M functional architecture baseline draft. oneM2M Technical Specification, oneM2M-TS-0001-V-2014-08 oneM2M. (2014). oneM2M functional architecture baseline draft. oneM2M Technical Specification, oneM2M-TS-0001-V-2014-08
18.
Zurück zum Zitat Li, Q., Xu, M., Yang, Y., Gao, L., Cui, Y., & Wu, J. (2014). Safe and practical energy-efficient detour routing in IP networks. IEEE/ACM Transactions on Networking, 22(6), 1925–1937.CrossRef Li, Q., Xu, M., Yang, Y., Gao, L., Cui, Y., & Wu, J. (2014). Safe and practical energy-efficient detour routing in IP networks. IEEE/ACM Transactions on Networking, 22(6), 1925–1937.CrossRef
19.
Zurück zum Zitat Kang, W., Sha, L., Berlin, R. B., & Goldman, J. M. (2015). The design of safe networked supervisory medical systems using organ-centric hierarchical control architecture. IEEE Journal of Biomedical and Health Informatics, 19(3), 1077–1086. Kang, W., Sha, L., Berlin, R. B., & Goldman, J. M. (2015). The design of safe networked supervisory medical systems using organ-centric hierarchical control architecture. IEEE Journal of Biomedical and Health Informatics, 19(3), 1077–1086.
20.
Zurück zum Zitat Kang, K., Pang, Z., Da Xu, L., Ma, L., & Wang, C. (2014). An interactive trust model for application market of the internet of things. IEEE Transactions on Industrial Informatics, 10(2), 1516–1526.CrossRef Kang, K., Pang, Z., Da Xu, L., Ma, L., & Wang, C. (2014). An interactive trust model for application market of the internet of things. IEEE Transactions on Industrial Informatics, 10(2), 1516–1526.CrossRef
21.
Zurück zum Zitat Ferrant, J.-L., & Ruffini, S. (2011). Evolution of the standards for packet network synchronization. IEEE Communications Magazine, 49(2), 132–138.CrossRef Ferrant, J.-L., & Ruffini, S. (2011). Evolution of the standards for packet network synchronization. IEEE Communications Magazine, 49(2), 132–138.CrossRef
22.
Zurück zum Zitat Ouellette, M., Ji, J., Liu, S., & Li, H. (2011). Using IEEE 1588 and boundary clocks for clock synchronization in telecom networks. IEEE Communications Magazine, 49(2), 164–171.CrossRef Ouellette, M., Ji, J., Liu, S., & Li, H. (2011). Using IEEE 1588 and boundary clocks for clock synchronization in telecom networks. IEEE Communications Magazine, 49(2), 164–171.CrossRef
23.
Zurück zum Zitat IEEE. (2011). IEEE standard profile for use of IEEE 1588 precision time protocol in power system applications. IEEE Standard, C37.238, 1–66. IEEE. (2011). IEEE standard profile for use of IEEE 1588 precision time protocol in power system applications. IEEE Standard, C37.238, 1–66.
24.
Zurück zum Zitat Li, C., & Li, L. (2014). Phased scheduling for resource-constrained mobile devices in mobile cloud computing. Wireless Personal Communications, 77(4), 2817–2837.CrossRef Li, C., & Li, L. (2014). Phased scheduling for resource-constrained mobile devices in mobile cloud computing. Wireless Personal Communications, 77(4), 2817–2837.CrossRef
25.
Zurück zum Zitat Kim, S., & Ryoo, I. (2010). Packet forwarding scheme based on interworking architecture for future internet. IEICE Transactions on Communications, E93-B(3), 546–550.CrossRef Kim, S., & Ryoo, I. (2010). Packet forwarding scheme based on interworking architecture for future internet. IEICE Transactions on Communications, E93-B(3), 546–550.CrossRef
26.
Zurück zum Zitat Kim, S. (2015). QoS-aware data forwarding architecture for multimedia streaming services in hybrid peer-to-peer networks. Peer-to-Peer Networking and Applications, 8(4), 557–566.CrossRef Kim, S. (2015). QoS-aware data forwarding architecture for multimedia streaming services in hybrid peer-to-peer networks. Peer-to-Peer Networking and Applications, 8(4), 557–566.CrossRef
27.
Zurück zum Zitat Ryoo, I., Na, W., & Kim, S. (2015). Information exchange architecture based on software defined networking for cooperative intelligent transportation systems. Cluster Computing, 18(2), 771–782.CrossRef Ryoo, I., Na, W., & Kim, S. (2015). Information exchange architecture based on software defined networking for cooperative intelligent transportation systems. Cluster Computing, 18(2), 771–782.CrossRef
28.
Zurück zum Zitat Kim, S., & Suk, J. (2015). Efficient peer-to-peer context awareness data forwarding scheme in emergency situations. Peer-to-Peer Networking and Applications. doi:10.1007/s12083-015-0401-8. Kim, S., & Suk, J. (2015). Efficient peer-to-peer context awareness data forwarding scheme in emergency situations. Peer-to-Peer Networking and Applications. doi:10.​1007/​s12083-015-0401-8.
Metadaten
Titel
Safe Data Transmission Architecture Based on Cloud for Internet of Things
verfasst von
Seokhoon Kim
Wonshik Na
Publikationsdatum
01.01.2016
Verlag
Springer US
Erschienen in
Wireless Personal Communications / Ausgabe 1/2016
Print ISSN: 0929-6212
Elektronische ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-015-3063-1

Weitere Artikel der Ausgabe 1/2016

Wireless Personal Communications 1/2016 Zur Ausgabe

Neuer Inhalt