Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Management Information System Expert

Please provide feedback for the paper idea below.

Let me know if you thinks a good idea

IoT Interoperability and Standardization

The Internet of Things (IoT) phenomena has grown increasingly more prevalent in our lives as the cost of the technologies behind it decrease and become more accessible. New items and devices are constantly being added to the IoT framework, creating more and more data with each passing day. This organically maturing technology faces many challenges, due in part to its accelerated and undirected growth.

One such challenge is the lack of interoperability and standardization of communication and cooperation amongst IoT devices and platforms, which impairs cross-domain knowledge due to "heterogeneity of data" (Shi, Li, Zhu, and Ning, 2018, p 1). This communication challenge stymies the widescale adoption and realization of the global IoT ecosystem (Ganzha, Paprzycki, Pawlowshi, Szmeja, and Wasielewska, 2018, p. 103).

There are many potential paths forward to overcoming these sorts of communication issues. Semantic solutions have been discussed, including Data Semantization, which focuses on standardization of mark-ups and meta data for more direct processing of data. (Shi et al., 2018), and Ontologies, which focus on the storage of knowledge (Ganzha et al., 2018).

System synergistic architecture solutions have been introduced, including hardware, firmware, and "Person-where" (Anderson, Fierro, and Culler, 2017). Opportunistic mobile gateways have also been discussed, specifically as it applies to the smart phone (Aloi et al., 2017).

There are many potential solutions to the challenges of cooperative collaboration between IoT devices being proposed in current research.

There is no doubt however, that the need is real to find a solution which increases the interoperability of IoT technologies.

Purpose Statement

The purpose of this research is to survey the current methods and strategies for creating, expanding, and standardizing interoperability amongst IoT devices and platforms.

Research Worthy Problem Statement

Internet of Things technologies are being created and adopted on a global scale, without "specific central technical coordination and control" (Aloi et al., 2017, p 75).

This lack of centralized authority and standardization, compounded with the typical high-degree of heterogeneity amongst IoT concepts (devices, protocols, data and semantics, etc), creates a situation rife with integration and communication issues (Aloi et al., 2017, p. 75).

The implementation of a successful standardization of interoperability amongst IoT devices could potentially reduce the impact of IoT data silos as the technology continues to mature (Shi et al., 2018). Additional benefits of such standardization would include the promotion of smoother communication and cooperation between IoT technologies, allowing for a more fully realized global IoT infrastructure and ecosystem (Ganzha et al., 2018).

Significance and Relevance

A great advantage and power of the IoT movement is the very fact that it is a collection of a wide range of individual sensors and devices, connected to one another to perform something grander than any individual node alone could accomplish.

Unfortunately, the very nature of this sort of setup leads to the interoperability and integration challenges listed above.

Solutions for these challenges can come from many domains, perhaps even a combination of previously unconnected domains.

A survey of these domains, and the current trends of research within them provides a larger base of potential solutions, potentially providing synergy to the research process in general.

Management Information System, Management Studies

  • Category:- Management Information System
  • Reference No.:- M92676840
  • Price:- $30

Priced at Now at $30, Verified Solution

Have any Question?


Related Questions in Management Information System

Question research how a risk assessment methodology process

Question : Research how a risk assessment methodology process can be used to assess risk at a maximum security facility. Write a minimum of 1 page (do not count the abstract and reference page). The paper should have Abs ...

Threats vulnerabilities security controls and

Threats, Vulnerabilities, Security Controls, and Countermeasures Description: The objective of this project is to create a comprehensive threat model on a software application of your choosing. This assignment will requi ...

Assignment1the following statement applies to snow flaked

Assignment 1. The following statement applies to snow flaked schemas: a. Large savings in storage space b. Normalized structures are more difficult to update and maintain c. Schema is less intuitive and end-users are put ...

Assignment purpose the purpose of this assignment is to

Assignment Purpose: The purpose of this assignment is to explore exchange of heath information Assignment Description: Step One: Perform a web search and locate information about healthcare data interchange standards suc ...

Assignmentyou are still the project manager for the

Assignment You are still the project manager for the computer upgrades. Briefly describe the four 4 risks you identified in Unit 2's Individual Project. Using the risk assessment techniques, describe your assessment deci ...

Enterprise architecture framework research paper

Enterprise Architecture Framework Research Paper Assignment Purpose of this Assignment This assignment gives you the opportunity to apply your research skills, analysis, and critical thinking skills to describe one of th ...

Discussion 1security countermeasures and strategic

Discussion 1. "Security Countermeasures and Strategic Governance" Please respond to the following: • Recommend three countermeasures that could enhance the information security measures of an enterprise. Justify your rec ...

The format of your paper will need to follow the following

The format of your paper will need to follow the following outline in APA format (include title page, abstract page, content pages, and reference page): INTRODUCTION State the topic you are attempting to cover State the ...

Assessment instructionsfor this assessment you will

Assessment Instructions For this assessment, you will complete your perimeter security strategy. Each organization or company would need to show how their data, assets, and networks are protected. In this assessment, you ...

Descriptionrefer to this resource when completing the its

Description: Refer to this resource when completing the It's All About the HAT assignment. In this assignment, students will learn to use and identify tools that may be helpful in their navigation of security related eve ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As