Abstract

The Detection Data Processing Mechanism for Vehicular Cyber Physical System in IoT Environment

Highlights

  • The emergence of IoT (Internet of Things) is attributed to the strides made in sensor networks and ubiquitous computing and it refers to the intelligent technologies and the service environment that enable autonomous communications between people and things but between things and things by connecting all things wirelessly

  • The fourth industrial revolution refers to the age of technological convergence in which the boundaries between physical space, digital space and bio-engineering space become blurred by the digital revolution in IT and electronics technology

  • This paper proposes a processing mechanism for the Vehicular CPS service among the CPS services considering the steps 5 and 6 of the Fourth Industrial Revolution and Gartner's digital business roadmap

Read more

Summary

INTRODUCTION

The emergence of IoT (Internet of Things) is attributed to the strides made in sensor networks and ubiquitous computing and it refers to the intelligent technologies and the service environment that enable autonomous communications between people and things but between things and things by connecting all things wirelessly. Because the medical actions regarding the users are stored in a virtual space on the cloud, they can immediately get medical care from a different hospital than the one they usually get it from [16] In this context, intelligent remote ECG monitoring was performed in the U-Health industrial environment. A system that is aware of each of the multiple users based on U-health data on the cloud is designed, which provides them with customized control services in real-time. Related research proposed an access control system to protect sensitive data obtained by sensors in IoT environment by situational awareness It focuses on the management of access privileges which allow or deny access depending on user context, with access control policies that deny access to the data stored in the network for unauthorized users. A system is designed in which each of the multiple users is recognized by matching data of user with the cloud and which provides real-time control services based on threshold values of different users

Fog Computing
Trust Support for SDN Controllers and Virtualized Network Applications
Biometric Sensor Based Authentication
Design of the System Structure
Potential Security Threats to the 5G Network
System Module and Detailed Process
Vector Element for Detection
Find the Necessary Vector Elements
Data Transmission Experiment
Comparative Analysis
Findings
CONCLUSIONS
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call