Research on key technologies of data processing in internet of things

被引:1
|
作者
Zhu, Yangqing [1 ]
Liang, Peiying [1 ]
机构
[1] Foshan Univ, Dept Internet Things Engn, Elect & Informat Engn Sch, Teacher Room 506, Foshan, Peoples R China
关键词
D O I
10.1088/1742-6596/887/1/012047
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The data of Internet of things (IOT) has the characteristics of polymorphism, heterogeneous, large amount and processing real-time. The traditional structured and static batch processing method has not met the requirements of data processing of IOT. This paper studied a middleware that can integrate heterogeneous data of IOT, and integrated different data formats into a unified format. Designed a data processing model of IOT based on the Storm flow calculation architecture, integrated the existing Internet security technology to build the Internet security system of IOT data processing, which provided reference for the efficient transmission and processing of IOT data.
引用
收藏
页数:6
相关论文
共 50 条
  • [1] Research on Key Technologies for Internet of Things
    Shi Guo-liang
    Liu Yu-xi
    [J]. DIGITAL MANUFACTURING & AUTOMATION III, PTS 1 AND 2, 2012, 190-191 : 308 - +
  • [2] Research on Architecture and Key Technologies of the Internet of things
    Mi, Qing
    Ni, Zhen-tao
    Wang, Xiao-duan
    [J]. PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING, 2015, 17 : 307 - 311
  • [3] Research on Key Technologies and Application of Internet of Things
    Guo, Zhen-jun
    [J]. 2013 25TH CHINESE CONTROL AND DECISION CONFERENCE (CCDC), 2013, : 2797 - 2801
  • [4] Research on key technologies of data security and privacy protection in Internet of Things group intelligence
    Liu, Yadong
    Hua, Yahui
    Chen, Qingrong
    [J]. OPTICAL AND QUANTUM ELECTRONICS, 2024, 56 (01)
  • [5] Research on key technologies of data security and privacy protection in Internet of Things group intelligence
    Yadong Liu
    Yahui Hua
    Qingrong Chen
    [J]. Optical and Quantum Electronics, 2024, 56
  • [6] Services and Key Technologies of the Internet of Things
    Xing Xiaojiang
    [J]. ZTE Communications, 2010, 8 (02) : 26 - 29
  • [7] Analysis of key technologies in the Internet of things
    Wang Rui
    Wang Jinguo
    Wang Na
    [J]. PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON MATERIAL, MECHANICAL AND MANUFACTURING ENGINEERING, 2015, 27 : 938 - 941
  • [8] Internet of Things security threats and key technologies
    Fadhil, Saif Aamer
    [J]. JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2021, 24 (07): : 1951 - 1957
  • [9] Internet of Medical Things: Enabling Key Technologies
    Forrest, Shawn
    Baker, Kaitlyn
    Ketel, Mohammed
    [J]. SOUTHEASTCON 2021, 2021, : 707 - 711
  • [10] Security model and key technologies for the Internet of things
    Yang, Jin-Cui
    Fang, Bin-Xing
    [J]. Journal of China Universities of Posts and Telecommunications, 2011, 18 (SUPPL.2): : 109 - 112