ترجمه مقاله نقش ضروری ارتباطات 6G با چشم انداز صنعت 4.0
- مبلغ: ۸۶,۰۰۰ تومان
ترجمه مقاله پایداری توسعه شهری، تعدیل ساختار صنعتی و کارایی کاربری زمین
- مبلغ: ۹۱,۰۰۰ تومان
Abstract
The Internet of Things’ (IoT’s) rapid growth is constrained by resource use and fears about privacy and security. A solution jointly addressing security, efficiency, privacy, and scalability is needed to support continued expansion. We propose a solution modeled on human use of context and cognition, leveraging cloud resources to facilitate IoT on constrained devices. We present an architecture applying process knowledge to provide security through abstraction and privacy through remote data fusion. We outline five architectural elements and consider the key concepts of the “Data Proxy” and the “Cognitive Layer.” The Data Proxy uses system models to digitally mirror objects with minimal input data, while the Cognitive Layer applies these models to monitor the system’s evolution and to simulate the impact of commands prior to execution. The Data Proxy allows a system’s sensors to be sampled to meet a specified “Quality of Data” (QoD) target with minimal resource use. The efficiency improvement of this architecture is shown with an example vehicle tracking application. Finally, we consider future opportunities for this architecture to reduce technical, economic, and sentiment barriers to the adoption of the IoT.
CONCLUSIONS
We identified opportunities to improve the Internet of Things, proposing the creation of a new architecture with Quality of Data Targets, Security and Cognitive Layers, mathematical-model based Data Proxies, and an Application Agent to optimizing sampling costs or minimizing error subject to constraints. Building upon the human model of applying context and cognition to data management, our architecture abstracts physical from digital systems to improve security and efficiency. It applies context information to supervise systems and to protect them against malicious commands, fuses data to provide difficult to obtain measurements, and uses estimation to minimize sampling cost. Together with clear ownership policies and data sharing visualizations [10], [11], this architecture’s use of abstraction and creation of “black boxed” aggregate data addresses privacy concerns. Using the practical application of Usage Based Insurance, we demonstrated that Proxy models which are well calibrated to an underlying physical process may allow us to reduce the energy necessary to represent that process in the cloud. We demonstrated that querying information does not require one-to-one sampling of the sensors instrumenting that process, and showed that it is possible to substantially minimize costs without significantly increasing measurement error. This level of abstraction and sensor fusion improves security by eliminating applications’ direct access to physical systems and preventing the long-term storage of sensitive data. Further, this same technique may be used to minimize data transmitted, conserving costly bandwidth.