Previous Page  49 / 61 Next Page
Information
Show Menu
Previous Page 49 / 61 Next Page
Page Background

48

Popular research projects on IoT devices in Qatar are illustrated below.

1) An Intelligent Car Monitoring system

is developed by Jabbar

et.al

[6] in collaboration with Qatar Foundation and Qatar

University, for road safety and traffic control in Qatar. The model is based on the naturalistic driver behavior using existing traffic

monitoring systems. The authors have used Deep Learning and Neural

Networks to collect and analyze

data to provide dynamic

information

about

road

conditions, high and low risk

locations.

2) Context aware

name discovery for block chain based services in IoTs

was proposed by

Roberto Di et. al [7] from HBKU, to easily identify services in IoT devices using universal multi-layer blockchains. The model is

based on the existing protocols and uses publicly available information from one block chain to gather meaningful knowledge from

the environment.

3) A Survey on IoTs, Protocols and Applications

by M. Guizani et. al, Qatar University [8]. This work summarizes the

technologies, most relevant protocols, and security issues of Internet of Things (IoT). The fundamental concepts of architecture

and building blocks are made clear in the beginning to comprehend further deep understanding of protocols. The working of the

protocols at each layer is mentioned with graphs and clear

illustration. Higher technical terms are used in simple English for

the reader to gain insight into terminologies used in IoTs. The

paper has covered large details on the standard protocols

proposed by IETF, IEEE and EPCglobal. This article helps

student and researchers to understand key IoT characteristics

and elements without much effort to quick start new research in

emerging areas like big data analytics, cloud fog computing.

4) A comprehensive survey on application of Deep Learning

methods for IoT Security

: by Amr Mohamed et. al., Qatar

University [9]. The work explores the issues and challenges in

implementing the security measures, such as encryption,

authentication, access control, network security and application

security for the IoT devices. It highlights how intelligent

techniques can be used to enhance the security. The research

suggests that intelligent monitoring provides a significant

solution to new or zero-day attacks. ML/DL are the robust methods for data exploration, management and for learning ‘normal’ and

‘abnormal’ behavior of the network. The authors have enlisted all the recent work done in IoT security using ML/ DL,

providinglimitations and advantages of each method to trigger new direction of research and implementation of IOT security.

Figure 2 Intelligent Car Monitoring system

Figure 3 Hierarchical structure of

attributes.

Figure 4

Horizontal and Vertical market integration of IoTs