Advances in Future Internet and Industrial Internet of Things

A special issue of Symmetry (ISSN 2073-8994). This special issue belongs to the section "Computer".

Deadline for manuscript submissions: closed (31 January 2018) | Viewed by 26632

Special Issue Editor

Special Issue Information

Dear Colleagues,

After the emergence of the Internet and mobile communication networks, the Internet of Things (IoT) has been regarded as the third wave of information technology. The Industrial Internet of Things (IIoT) is the use of IoT technologies in manufacturing. IIoT incorporates machine learning and big data technology, sensor data, and machine-to-machine (M2M) communications that have existed in industrial areas for years. In the future, people and objects will be connected at any time, any place, with anything, anyone, and will utilize any network and services. IIoT is creating a new world, where people and businesses can manage their assets in more informed ways, and can make more opportune and better informed decisions. Many advanced IIoT and 5G technologies have been successfully applied in everyday life, but there are still many practical problems, tackled by traditional methods, which are generally difficult to experimentally solve in the advanced Industrial Internet of Things.

This Special Issue covers pure research and applications within novel scopes related to IIoT, such as future Internet, 5G smart network, cloud computing, and mobile technologies based on IIoT. In addition, it deals with hardware/software technologies, new frameworks and architectures, efficient data processing in IIoT, specific mathematical models, and designs for theories for the future Internet.

All submitted papers will be peer-reviewed and selected on the basis of both their quality and their relevance to the theme of this Special Issue. This Special Issue solicits innovative ideas and solutions, in all aspects of future sustainable computing for advanced information technologies. Topics of interest include, but are not limited to:

  • Future Internet and Industrial Internet of Things (IIoT)

  • Future Internet and Smart Cities

  • Future Internet Infrastructures (Cloud, 5G, SDN, Mobile, etc.)

  • 5G Smart Network Technologies

  • User Aspects on Future Internet Applications

  • Privacy and security and trust management in Future Internet

  • Multimedia systems and services in Future Internet

  • Successful Use Cases of the Future Internet

  • Future Internet policy and business management

  • Future Internet and energy management

  • Future Internet and sustainable mobility

  • Networking and communications in Future Internet

  • Embedded systems and software in Future Internet

  • Distributed and parallel algorithms in Future Internet

  • Impact of Future Internet on Public Services

  • Social Impact of Future Internet Applications

Prof. Dr. James Park
Guest Editor

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Symmetry is an international peer-reviewed open access monthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2400 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • Future Internet

  • Industrial Internet of Things

  • 5G smart network

  • cloud computing

Published Papers (6 papers)

Order results
Result details
Select all
Export citation of selected articles as:

Editorial

Jump to: Research

4 pages, 290 KiB  
Editorial
Advances in Future Internet and the Industrial Internet of Things
by Jong Hyuk Park
Symmetry 2019, 11(2), 244; https://doi.org/10.3390/sym11020244 - 16 Feb 2019
Cited by 24 | Viewed by 3129
Abstract
After the emergence of the Internet and mobile communication networks, the IoT has been considered as the third wave of information technology. The Industrial Internet of Things (IIoT) is the use of Internet of Things (IoT) technologies in manufacturing. IIoT incorporates machine learning [...] Read more.
After the emergence of the Internet and mobile communication networks, the IoT has been considered as the third wave of information technology. The Industrial Internet of Things (IIoT) is the use of Internet of Things (IoT) technologies in manufacturing. IIoT incorporates machine learning and big data technology, sensor data, and machine-to-machine (M2M) communications that have existed in industrial areas for years. In the future, people and objects will be connected at any time, any place, with anything and anyone and will utilize any network and services. IIoT is creating a new world in which people and businesses can manage their assets in more informed ways and can make more opportune and better-informed decisions. Many advanced IIoT and 5G technologies have been successfully applied in everyday life, but there are still many practical problems tackled by traditional methods which are generally difficult to experimentally solve in the advanced Industrial Internet of Things. Therefore, in this special issue, we accepted five articles in three different dimensions: communication networks, optimized resource provisioning and data forwarding, privacy and security. Full article
(This article belongs to the Special Issue Advances in Future Internet and Industrial Internet of Things)

Research

Jump to: Editorial

17 pages, 1342 KiB  
Article
Symmetric Agency Graphs Facilitate and Improve the Quality of Virtual Network Embedding
by Chenggui Zhao and Behrooz Parhami
Symmetry 2018, 10(3), 63; https://doi.org/10.3390/sym10030063 - 11 Mar 2018
Cited by 4 | Viewed by 3103
Abstract
Virtual network embedding (VNE) is a key technology in network virtualization. Advantages of network symmetry are well known in the design of load-balanced routing algorithms and in network performance analysis. Our work in this paper shows that benefits of graph symmetry also extend [...] Read more.
Virtual network embedding (VNE) is a key technology in network virtualization. Advantages of network symmetry are well known in the design of load-balanced routing algorithms and in network performance analysis. Our work in this paper shows that benefits of graph symmetry also extend to the domain of network embedding. Specifically, we propose an efficient VNE method based on modular and structured agency guidance, a regular graph function. The proposed method, which is based on symmetric intermediate graphs, offers two main advantages. Firstly, characteristics of the intermediate structures enhance the computational efficiency of the VNE process. Secondly, the static agency network modeled with such intermediate structures improves the quality of the resulting embedding. These two advantages of our method are elaborated upon and verified by examples and simulations, respectively. In addition, we present a theoretical analysis explaining the reasons behind the benefits offered by such middleware. Full article
(This article belongs to the Special Issue Advances in Future Internet and Industrial Internet of Things)
Show Figures

Figure 1

4989 KiB  
Article
Fast and Efficient Data Forwarding Scheme for Tracking Mobile Targets in Sensor Networks
by Mi Zhou, Ming Zhao, Anfeng Liu, Ming Ma, Tiang Wang and Changqin Huang
Symmetry 2017, 9(11), 269; https://doi.org/10.3390/sym9110269 - 09 Nov 2017
Cited by 13 | Viewed by 4064
Abstract
Transferring emergent target tracking data to sinks is a major challenge in the Industrial Internet of Things (IIoT), because inefficient data transmission can cause significant personnel and property loss. For tracking a constantly moving mobile target, sensing data should be delivered to sinks [...] Read more.
Transferring emergent target tracking data to sinks is a major challenge in the Industrial Internet of Things (IIoT), because inefficient data transmission can cause significant personnel and property loss. For tracking a constantly moving mobile target, sensing data should be delivered to sinks continuously and quickly. Although there is some related research, the end to end tracking delay is still unsatisfying. In this paper, we propose a Fast and Efficient Data Forwarding (FEDF) scheme for tracking mobile targets in sensor networks to reduce tracking delay and maintain a long lifetime. Innovations of the FEDF scheme that differ from traditional scheme are as follows: firstly, we propose a scheme to transmit sensing data through a Quickly Reacted Routing (QRR) path which can reduce delay efficiently. Duty cycles of most nodes on a QRR path are set to 1, so that sleep delay of most nodes turn 0. In this way, end to end delay can be reduced significantly. Secondly, we propose a perfect method to build QRR path and optimize it, which can make QRR path work more efficiently. Target sensing data routing scheme in this paper belongs to a kind of trail-based routing scheme, so as the target moves, the routing path becomes increasingly long, reducing the working efficiency. We propose a QRR path optimization algorithm, in which the ratio of the routing path length to the optimal path is maintained at a smaller constant in the worst case. Thirdly, it has a long lifetime. In FEDF scheme duty cycles of nodes near sink in a QRR path are the same as that in traditional scheme, but duty cycles of nodes in an energy-rich area are 1. Therefore, not only is the rest energy of network fully made use of, but also the network lifetime stays relatively long. Finally, comprehensive performance analysis shows that the FEDF scheme can realize an optimal end to end delay and energy utilization at the same time, reduce end to end delay by 87.4%, improve network energy utilization by 2.65%, and ensure that network lifetime is not less than previous research. Full article
(This article belongs to the Special Issue Advances in Future Internet and Industrial Internet of Things)
Show Figures

Figure 1

3297 KiB  
Article
SINR-Based MCS Level Adaptation in CSMA/CA Wireless Networks to Embrace IoT Devices
by Soohyun Cho
Symmetry 2017, 9(10), 236; https://doi.org/10.3390/sym9100236 - 19 Oct 2017
Cited by 6 | Viewed by 4875
Abstract
This paper presents an automatic modulation and coding scheme (MCS) level adaptation algorithm to embrace Internet of Things (IoT) devices by improving the area spectral efficiency of carrier-sense multiple access with collision avoidance (CSMA/CA) wireless networks. In the proposed algorithm, senders of CSMA/CA [...] Read more.
This paper presents an automatic modulation and coding scheme (MCS) level adaptation algorithm to embrace Internet of Things (IoT) devices by improving the area spectral efficiency of carrier-sense multiple access with collision avoidance (CSMA/CA) wireless networks. In the proposed algorithm, senders of CSMA/CA wireless networks use the signal to interference plus noise ratio of acknowledgment frames from their receivers to estimate channel statuses between the senders and the receivers. Using the estimated channel status of each receiver, senders control sending rates of traffic by adjusting MCS levels of packets destined for each receiver. We use Poisson point processes (PPPs) to model the locations of participating nodes (i.e., access points and wireless devices) in a given area. We evaluate the effectiveness of the proposed algorithm using an event-driven ns-2 simulator for various PPP densities of access points and wireless devices. Full article
(This article belongs to the Special Issue Advances in Future Internet and Industrial Internet of Things)
Show Figures

Figure 1

724 KiB  
Article
How to Obtain Common Criteria Certification of Smart TV for Home IoT Security and Reliability
by Sooyoung Kang and Seungjoo Kim
Symmetry 2017, 9(10), 233; https://doi.org/10.3390/sym9100233 - 17 Oct 2017
Cited by 9 | Viewed by 5660
Abstract
In the new era of IoT (Internet of Things), numerous gadgets and services include innovative IoT technologies that provide customers with convenience and improve their quality of life. Smart TVs are typical IoT devices that offer broadcasting services. However, they are susceptible to [...] Read more.
In the new era of IoT (Internet of Things), numerous gadgets and services include innovative IoT technologies that provide customers with convenience and improve their quality of life. Smart TVs are typical IoT devices that offer broadcasting services. However, they are susceptible to security intrusions via e-mail, media players, cameras, and internet connectivity. The frequency of hacking through malicious applications installed in Smart TV has rapidly increased. Therefore, appropriate countermeasures should be developed immediately. In April 2017, we (with LG electronics) received the ‘world-first’ Common Criteria EAL2 (Evaluation Assurance Level 2) certification for Smart TVs. As far as we know, no Smart TV has received a Common Criteria EAL2 security certification until now. This article describes our experience with the certification process and examines several security and reliability aspects of Smart TVs. Full article
(This article belongs to the Special Issue Advances in Future Internet and Industrial Internet of Things)
Show Figures

Figure 1

2080 KiB  
Article
An Efficient Secure Scheme Based on Hierarchical Topology in the Smart Home Environment
by Mansik Kim, Kyung-Soo Lim, Jungsuk Song and Moon-seog Jun
Symmetry 2017, 9(8), 143; https://doi.org/10.3390/sym9080143 - 03 Aug 2017
Cited by 5 | Viewed by 5010
Abstract
As the Internet of Things (IoT) has developed, the emerging sensor network (ESN) that integrates emerging technologies, such as autonomous driving, cyber-physical systems, mobile nodes, and existing sensor networks has been in the limelight. Smart homes have been researched and developed by various [...] Read more.
As the Internet of Things (IoT) has developed, the emerging sensor network (ESN) that integrates emerging technologies, such as autonomous driving, cyber-physical systems, mobile nodes, and existing sensor networks has been in the limelight. Smart homes have been researched and developed by various companies and organizations. Emerging sensor networks have some issues of providing secure service according to a new environment, such as a smart home, and the problems of low power and low-computing capacity for the sensor that previous sensor networks were equipped with. This study classifies various sensors used in smart homes into three classes and contains the hierarchical topology for efficient communication. In addition, a scheme for establishing secure communication among sensors based on physical unclonable functions (PUFs) that cannot be physically cloned is suggested in regard to the sensor’s low performance. In addition, we analyzed this scheme by conducting security and performance evaluations proving to constitute secure channels while consuming fewer resources. We believe that our scheme can provide secure communication by using fewer resources in a smart home environment in the future. Full article
(This article belongs to the Special Issue Advances in Future Internet and Industrial Internet of Things)
Show Figures

Figure 1

Back to TopTop