Analysis of Technical Solutions for Identification of Internet Things in Modern Communication Networks
Keywords:internet of things, digital object architecture, identification, delay, handle system, methods of queuing theory, digital object, global handle registry, local handle registry, local handle service
The article examines the current state of development of the Internet of Things and the principles of their identification; analysis of technical solutions for identification of the Internet of Things in modern communication networks; the parameters of quality of service and identification of devices and applications of the Internet of Things are investigated, and also the perspective method of construction of network architecture IoT with intermediate level of interaction which differs from known that allows to reduce network delay at exchange of service messages between local and global registers of system is investigated. Based on the obtained delay values, we can conclude that in order to minimize the delay, it is necessary to optimize the routes for accessing GHR servers. Considering the differences between the main components of the identification system, it is worth noting the combination of Global Handle Register and Local Handle Register in one object for testing. In the long run, this makes it possible to evaluate the multiple characteristics of the system at the application level. The resulting system in stationary execution also allows you to clearly demonstrate the speed of the identification rate, the route of service traffic and other parameters.
R. Kirichek, V. Kulik, and A. Koucheryavy, “False clouds for Internet of Things and methods of protection,” Proceedings of the 18th International Conference on Advanced Communication Technology (ICACT, Pyeongchang, South Korea, 31 January–3 February 2016). Piscataway, NJ: IEEE, 2016, pp. 201–205. https://doi.org/10.1109/ICACT.2016.7423328
M. Al-Bahri, A. Yankovsky, R. Kirichek, and A. Borodin, “Smart System Based on DOA and IoT for Products Monitoring and Anti-Counterfeiting,” Proceedings of the 4th MEC International Conference on Big Data and Smart City (ICBDSC, Muscat, Oman, 15–16 January 2019). Piscataway, NJ: IEEE, 2019. https://doi.org/10.1109/ICBDSC.2019.8645610
M. Al-Bahri, A. Yankovsky, A. Borodin, and R. Kirichek, “Testbed for Identify IoT-Devices Based on Digital Object Architecture," Internet of Things, Smart Spaces, and Next Generation Networks and Systems. Proceedings of the 18th International Conference, NEW2AN, and the 11th Conference, ruSMART (27–29 August 2018, St. Petersburg, Russia). Lecture Notes in Computer Science. Cham: Springer, vol. 11118, 2018, pp. 129–137. https://doi.org/10.1007/978-3-030-01168-0_12
M. Albahri, R. Kirichek, A. A. Ateya, A. Muthanna, and A. Borodin, “Combating Counterfeit for Io T System Based on DOA,” Proceedings of the 10th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT, 5–9 November, 2018, Moscow, Russia). Piscataway, NJ: IEEE, 2018. https://doi.org/10.1109/ICUMT.2018.8631257
M. S. Al-Bahri, R. V. Kirichek, and D. D. Sazonov, “Modeling the system of identification of devices of the Internet of things based on the architecture of digital objects,” Proceedings of educational institutions of communication, vol. 5, no. 1, 2019, pp. 42–47. [in Russian] https://doi.org/10.31854/1813-324X-2019-5-1-42-47
M. Weyrich and C. Ebert, “Reference architectures for the internet of things,” IEEE Software, vol. 33, no. 1, 2016, pp. 112–116. https://doi.org/10.1109/MS.2016.20
V. G. Ivanenko and N. V. Ushakov, “Digital watermarks in electronic document flow,” Security of information technologies, no. 3, pp. 37–42, 2017. [in Russian] https://doi.org/10.26583/bit.2017.3.04
Authors who publish with this journal agree to the following terms:
Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).