Micro search engine for IoT: an IoT search engine prototype for private networks
Background: The Internet of Things (IoT) has been heralded as the “next big thing” waiting to be realized. IoT revolves around increased machine-to-machine communication and it encompasses various embedded sensorsand actuators that assist users in monitoring and controlling objects remotely in many...
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | English English English |
Published: |
Bentham Science Publishers B.V.
2018
|
Subjects: | |
Online Access: | http://irep.iium.edu.my/65272/ http://irep.iium.edu.my/65272/ http://irep.iium.edu.my/65272/ http://irep.iium.edu.my/65272/2/65272_Micro%20Search%20Engine%20for%20IoT_SCOPUS.pdf http://irep.iium.edu.my/65272/13/65272_Micro%20search%20engine%20for%20IoT.pdf http://irep.iium.edu.my/65272/19/65272_Micro%20search%20engine%20for%20IoT_WoS.pdf |
Summary: | Background: The Internet of Things (IoT) has been heralded as the “next big thing” waiting to be realized. IoT revolves around increased machine-to-machine communication and it encompasses various embedded sensorsand actuators that assist users in monitoring and controlling objects remotely in many fields and applications.
Methods: IoT's special characteristics introduce challenges in the field of retrieval technology. These challenges constitute of real-time data retrieval with the huge amount of data that can be produced from the sensors. This paper explains the design concepts used to develop a search engine for IoT to tackle these issues. The developed search engine appears to be promising. The performance of the network proved very powerful under normal conditions, however, it could not sustain heavy load under the stress test due to the restricted build of the Z1 motes.
Results: The searching capability proved to be quite strong in terms of searching speed and acceptable results; however more tests need to be implemented especially in terms of parallel searching. The GUI is simple and produces multiple features, but lacks interactivity. The security aspect ensures the security of the database with the partial prevention of SQL injection attacks.
Conclusion: However, more security measures are required to protect against eavesdropping and unauthentic clients. |
---|