Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Connectivity frameworks for smart devices : the Internet of Things from a distributed computing perspective
Mahmood Z., Springer International Publishing, New York, NY, 2016. 356 pp. Type: Book (978-3-319331-22-5)
Date Reviewed: May 8 2017

The security of IoT devices is challenging due to constrained computing power, memory capacity, and unreliable connectivity. This book is an aggregation of 14 independent chapters, written by different authors, on the security and framework of the Internet of Things (IoT). The first two chapters introduce existing IoT connectivity and security technologies. In the third chapter, various IoT issues and approaches are presented. This review only covers representative chapters, although an overall review of the book is also addressed.

Chapter 1 introduces the security features of different IoT protocols such as message queue telemetry transport (MQTT), advanced message queuing protocol (AMQP), constrained application protocol (CoAP), data distribution service for real-time systems (DDS), and extensible messaging and presence protocol (XMPP) in terms of common security technologies, including authentication, authorization, encryption, digital signing, and infrastructure security. This chapter focuses on introducing rather than discussing security; challenging issues related to the constrained resource are not discussed sufficiently here.

Chapter 3 introduces how a multiagent system can be exploited for a multihop routing protocol in a heterogeneous machine-to-machine (M2M) network. Because no prespecified multihop path exists in an M2M network due to mobility, a routing protocol needs to perform both path discovery and launch. The proposed agent-based approach includes two agents: a search agent that roams around the network environment and a walk agent that establishes the shortest path for a connection. This agent-based protocol seems to be reasonable, and the importance of the search agent will increase because multihop network environments will get dynamic and heterogeneous as various types of IoT devices emerge.

Chapter 4 proposes a scheme for security in vehicle networks (VANETs). The proposed scheme consists of two phases: a vehicle identification phase and a misbehaving vehicle detection phase. The VANET topology assumes a hierarchy including a certifying authority (CA), base stations (BS), and leaf nodes. The CA revokes misbehaving vehicles using separate service and control channels.

Chapter 5 proposes a resource-oriented IoT architecture. “Resource-oriented” means making an IoT resource visible and discoverable on the Internet so that the resource can be exploited by a third party as well as the owner. In order to make an IoT resource discoverable without an Internet protocol (IP) address, the proposed architecture exploits opaque link state advertisement (LSA) in the open shortest path first (OSPF) protocol. The approach makes regular OSPF routers deliver the opaque LSA among dedicated routers for IoT resources so that IoT resource information can be spread over the Internet. This experiment shows the proposed architecture is efficient in IoT resource sharing and reusability.

Chapter 7 proposes a device cloud architecture. The primary idea of this chapter is the same as chapter 5 in terms of resource sharing. The architecture consists of a data model, an interaction model, a communication model, a security model, and an application integration. The data model includes the type and category of devices; the interaction model includes discovery and access; the communication model includes device managing, monitoring, and profile managing; the security model includes an access token; and the application integration includes consumer profiles for device exploitation. The architectures proposed in chapters 5 and 7 are expected to be a solution to overcome the current closed and application-bounded IoT infrastructure.

Chapter 8 is about using multiple clouds. The main idea is to use different clouds with different performance levels and characteristics, allowing client-side middleware to exploit multiple clouds efficiently with dynamic task allocation based on measurement.

Most chapters present the state of the art of IoT research areas. Eight out of 14 chapters address security issues and six chapters address frameworks. The proposed frameworks pursue the same idea of resource sharing. This is natural because no single service provider could deploy IoT devices to cover the universal service area due to deployment and management costs. This book is a good guide for several issues about how device sharing can be efficient and safe. Nevertheless, this book lacks coverage of an important research domain. Due to the huge amount of IoT data and network delays, fog computing and edge computing emerge as essential parts of the IoT framework research area. The book would have been better if those topics were covered.

Reviewer:  Seon Yeong Han Review #: CR145251 (1707-0413)
Bookmark and Share
  Reviewer Selected
 
 
Real-Time And Embedded Systems (C.3 ... )
 
 
Frameworks (D.3.3 ... )
 
 
Distributed Systems (C.2.4 )
 
Would you recommend this review?
yes
no
Other reviews under "Real-Time And Embedded Systems": Date
Real-time and systems programming for PCs
Vickery C., McGraw-Hill, Inc., New York, NY, 1993. Type: Book (9780070674660)
Oct 1 1994
Manipulation of terrain data for a real-time display application
Vaughan J., Brookes G., Fletcher M., Wills D. Microprocessors & Microsystems 15(7): 347-353, 1991. Type: Article
Apr 1 1993
Parallel processing in industrial real-time applications
Lawson H., Prentice-Hall, Inc., Upper Saddle River, NJ, 1992. Type: Book (9780136545187)
Jun 1 1994
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy