Figure - available from: Mathematical Problems in Engineering
This content is subject to copyright. Terms and conditions apply.
IoT communication evolution model.

IoT communication evolution model.

Source publication
Article
Full-text available
A security model of multimedia education resource fusion based on multistage integration of multimedia educational resources is constructed in this paper in the context of smart education. First, the teaching model of multimedia education resource fusion is analyzed and the IoT communication evolution model and functional architecture model are con...

Similar publications

Preprint
Full-text available
The Robot Operating System (ROS) streamlines human processes, increasing the efficiency of various production tasks. However, the security of data transfer operations in ROS is still in its immaturity. Securing data exchange between several robots is a significant problem. This paper proposes \textit{AuthROS}, an Ethereum blockchain-based secure da...
Preprint
Full-text available
The Robot Operating System (ROS) streamlines human processes, increasing the efficiency of various production tasks. However, the security of data transfer operations in ROS is still in its immaturity. Securing data exchange between several robots is a significant problem. This paper proposes \textit{AuthROS}, an Ethereum blockchain-based secure da...

Citations

... In (Yuan, 2022), the author proposes a method dubbed Lightweight Scalable Blockchain (LSB) to improve the IoT's security and privacy. An overlay network is used in this method to accomplish decentralization while keeping end-to-end security and privacy. ...
Preprint
Full-text available
Internet of Things (IoT) has rapidly expanded with the interconnection of various devices through wireless networks. However, this widespread deployment of IoT devices has posed challenges in managing access to device resources due to their vast quantity and scale. As these IoT devices generate and share sensitive data, ensuring secure access becomes paramount. Traditional access control systems like Discretionary Access Control (DAC), Intelligent Dynamic Bandwidth Access Control (IBAC), and Mandatory Access Control (MAC) have limitations such as centralization, single-point failure, and low throughput, making them less suitable for dynamic and diverse IoT environment. To address these challenges, Role-Based Access Control (RBAC) emerges as a promising solution as it provides fine-grained and dynamic access control based on user attributes, resource attributes, action attributes, environmental attributes, permissions, and environmental context. In parallel, Blockchain Technology (BCT) has gained attention as a distributed data management system, ensuring data integrity through decentralization, immutability, and consensus mechanisms. Kafka-based Hyperledger Fabric, an open-source blockchain platform, offers more efficient consensus mechanisms, higher throughputs, and support for multiple organizations and ledgers. This study proposes to develop a novel "KafkaIoT" system, which integrates Kafka-based Hyperledger Fabric with RBAC to create a distributed access control system for IoT. By leveraging blockchain's distributed architecture, KafkaIoT addresses the challenges of record tracking, dynamic access control management, and access control in the IoT landscape. The seamless integration of BCT with IoT can enhance security and enable the development of distributed IoT-based cryptocurrency services, contributing to a safer and more reliable IoT ecosystem.