Service Level Management in Emerging Environments. Nader Mbarek
Чтение книги онлайн.

Читать онлайн книгу Service Level Management in Emerging Environments - Nader Mbarek страница 8

Название: Service Level Management in Emerging Environments

Автор: Nader Mbarek

Издательство: John Wiley & Sons Limited

Жанр: Отраслевые издания

Серия:

isbn: 9781119818328

isbn:

СКАЧАТЬ

      Figure 1.2. Architecture of the Internet of Things (Lin et al. 2015). For a color version of this figure, see www.iste.co.uk/mbarek/service.zip

      1.3.2.1. E-health

      An aging population requires monitoring of old people through a decentralized healthcare system based on a set of connected sensors. Each patient possesses a surveillance system that allows them to be monitored and surveilled without the need of visiting the medical center. The medical data collected in this way improve healthcare by customizing treatments and creating an easier everyday life for patients. Thus, automated systems can perform a major part of a doctor’s work (tests, diagnosis, prescriptions, behavior modification) by collecting and analyzing patient data both passively and actively. As a result, a comprehensive and rich database becomes available and can alert doctors to any need that arises, while also providing them with a general overview of the patient’s health up to that point. This application field of the IoT has attracted the attention of several international organizations that have attempted to standardize the technologies used in order to effectively respond to the requirements of this field (International Electrotechnical Commission 2017). International organizations aim to promote the use of e-health technologies around the world. The World Health Organization (WHO) and the Program for Appropriate Technology in Health (PATH) have entered into a partnership to accelerate the development of digital health around the world (World Health Organization 2018). This field of application has attracted a large number of industrial organizations that try to offer different products that would be useful for e-health. Indeed, Ericsson and its partners offer portable prototypes for the field of e-health with long battery lives (Ericsson 2018).

      1.3.2.2. Smart cities

      1.3.2.3. Vehicular networks

      1.4.1. Motivations and challenges

      The security of information systems is made up of all technical, organizational, legal and human resources required to prevent the unauthorized use, misuse, modification or hijacking of the information system. At present, security is a major challenge in the information world and the goal of security in this context is to maintain the trust of the users and the consistency of the entire information system. Several norms have arisen around concepts related to security, for example the X800 recommendation by ITU-T (1991), which emphasizes the role played by different security services and their applicability.

      The IoT is characterized by an environment that is subject to constraints across several levels, which makes it difficult to adopt security mechanisms that were designed for conventional systems. An IoT environment includes objects with low memory resources and limited computational power. Further, the techniques normally used in conventional networks were designed for systems that contained powerful microprocessors and had high storage capacities (Hanna 2015). Existing security techniques must thus be adapted. Further, the large number of objects in an IoT environment makes it a difficult and onerous task to adapt existing security algorithms. For example, methods and algorithms for identification and controlling access to objects become more and more complex as the number of objects in the environment keeps increasing.