A Secure IoT Service Architecture
Order ID:89JHGSJE83839 Style:APA/MLA/Harvard/Chicago Pages:5-10 Instructions:
A Secure IoT Service Architecture
A Secure IoT Service Architecture With an Efficient Balance Dynamics Based on Cloud and Edge Computing
Abstract:
The Internet of Things (IoT)-Cloud combines the IoT and cloud computing, which not only enhances the IoT’s capability but also expands the scope of its applications. However, it exhibits significant security and efficiency problems that must be solved. Internal attacks account for a large fraction of the associated security problems, however, traditional security strategies are not capable of addressing these attacks effectively. Moreover, as repeated/similar service requirements become greater in number, the efficiency of IoT-Cloud services is seriously affected. In this paper, a novel architecture that integrates a trust evaluation mechanism and service template with a balance dynamics based on cloud and edge computing is proposed to overcome these problems. In this architecture, the edge network and the edge platform are designed in such a way as to reduce resource consumption and ensure the extensibility of trust evaluation mechanism, respectively. To improve the efficiency of IoT-Cloud services, the service parameter template is established in the cloud and the service parsing template is established in the edge platform. Moreover, the edge network can assist the edge platform in establishing service parsing templates based on the trust evaluation mechanism and meet special service requirements. The experimental results illustrate that this edge-based architecture can improve both the security and efficiency of IoT-Cloud systems.
Published in: IEEE Internet of Things Journal ( Volume: 6 , Issue: 3 , June 2019 )
Page(s): 4831 – 4843
Date of Publication: 13 September 2018
ISSN Information:
INSPEC Accession Number: 18757966
DOI: 10.1109/JIOT.2018.2870288
Publisher: IEEE
Funding Agency:
SECTION I.
Introduction
The Internet of Things (IoT) is based on a very large number of objects/things that connect to the Internet to help humans perceive the world and improve their quality of life [1]. However, there are many IoT characteristics, such as limited storage and processing capacity, that can reduce the service performance of the IoT [2]. Cloud computing can address these limitations associated with the IoT in terms of management, storage, computation, and processing. Moreover, cloud computing can create more services by integrating IoT resources. Due to these advantages, the concept of IoT-Cloud has been proposed. This concept combines the advantages of the IoT and cloud computing technologies to provide more and better services [3]. However, there are still some security and efficiency problems with IoT-Cloud that must be solved.
The IoT is vulnerable to security threats, especially internal attacks that frequently occur in the physical device layer and the network communication layer [4]. Unlike internal attacks, external attacks can be resisted by traditional security mechanisms, such as encryption, authorization, and auditing [5]. However, traditional security mechanisms cannot resist internal attacks effectively, especially in the resource-constrained IoT [6]. In an internal attack, the attacker is in possession of some IoT devices and then conducts further attacks using these captured devices [7]. The trust evaluation mechanism, which is designed to solve internal attack issues, is an effective supplement to the traditional security mechanism [8]. However, many trust evaluation mechanisms in the IoT consume a lot of resources, which has a large impact on the IoT performance and lifetime. With increasingly many types of internal attacks appearing, it is unlikely that the size of the trust evaluation mechanism will be reduced.
With the increase in the number of IoT-Cloud applications, increasingly more repeated/similar requirements are sent to the cloud. It is inefficient for an IoT-Cloud system to address these requirements one by one and constantly improving hardware performance is not a long-term solution. In addition, there are delay issues in IoT-Cloud services since the cloud is far away from users and the IoT [9]. As failed services also reduce efficiency, it is necessary to solve some uncertainties in the IoT, such as device faults, network congestion, and large environment changes. In order to avoid these situations, monitoring, and data analysis tasks can be performed, however, it is not advised to perform these tasks in the cloud.
To solve the above problems, an edge-based IoT-Cloud architecture with a trust evaluation mechanism and service template was established. Edge computing is performed at the Internet’s edge with a lot of computing and storage nodes, such as gateways, routers, mobile fog nodes, and edge servers, which are close to the underlying network [10]. Edge computing also refers to cloudlets, micro datacenters, and fog nodes, which has advantages in the quick response to cloud services [11], [12]. The edge computing layer in this architecture is divided into two main parts: 1) the edge network and 2) the edge platform. The edge network is established on underlying edge nodes (move/static powerful nodes) and is parallel to the IoT. The edge platform is composed of edge nodes (edge servers) that lie between the IoT and cloud, and this platform is a central hub of the IoT-Cloud service architecture [13].
The main contributions can be summarized as follows.
- An edge network was adopted to move a large part of the trust evaluation mechanism out of the IoT. In the IoT, devices perform the direct trust calculation and send exceptions to the edge network. The edge network collects trust information from devices and analyzes this information for the entire trust state of the IoT.
- Service templates were established in the cloud and on the edge platform. The service parameter template in the cloud stores the matching information while the service parsing template on the edge platform stores the matching information and parsing strategies.
- The trust evaluation mechanism was integrated into IoT-Cloud services via edge computing. In the process of IoT service strategy establishment, the trust evaluation mechanism enables the edge platform to select trusted devices in order to generate or transfer data. Moreover, the edge network can monitor the IoT network load with balance dynamics and assist the edge platform in timely adjusting strategies.
This paper is organized as follows. In Section II, related work is introduced. The basic concept of a novel architecture is presented in Section III. Section IV presents the detailed design of the edge network, the edge platform and the functions in the cloud. Experiment results and analyses are reported in Section V. The final section concludes this paper.
SECTION II.
Related Work
To address internal attack issues, many trust mechanisms have been proposed. The trust mechanism plays an important role in many aspects, such as reliable data fusion and mining, user privacy protection, information security enhancement, and service assurance [14], [15].
In some cases, the IoT has both physical and social attributes. Based on this feature, Chen et al. [16] proposed a trust mechanism that can select effective feedback through a similarity filtering method based on friendship, social contact, and community of interest relationships. Moreover, to minimize the trust convergence time and resist recommendation trust attacks, an adaptive filtering technique is designed to find the best means of combining direct trust and recommendation trust. To resist attacks aimed at the recommendation trust, such as bad-mouthing, Alshehri et al. [17] proposed a scalable trust management solution based on IoT clustering to address practical and pressing issues. Of course, all storage and computation tasks are performed by physical IoT devices, which requires greater energy consumption. Considering trust derivation, Duan et al. [18] proposed an energy-aware trust derivation scheme that manages overheads through adopting a game theoretic approach in the trust derivation process. However, this scheme only provides partial security, and it is difficult to accurately measure the level of security.
There are many trust-based intrusion detection systems (IDSs) in wireless sensor networks (WSNs), which are used to defend against internal attacks. However, the efficiency of IDS is reduced on the IoT due to the very large amount of data that is generated during a short period. Meng et al. [19] proposed a Bayesian-based trust management method that incorporates traffic sampling into IDS under a hierarchical structure. Liu et al. [20] proposed a physical IDS-to-gateway and virtual IDS-to-gateway detection model that detects attacks against both physical sensors and virtual sensors (VSs). In IDSs, false alarm messages cannot be avoided and the intrusion detection threshold is difficult to set.
To solve data error issues in WSNs, Yang et al. [21] proposed a data error detection approach via which the cloud can quickly detect and locate errors in large sensor data sets. Data collection and transmission is an important part to maintain the QoS of IoT-Cloud. To ensure trustworthy data collection, Wang et al. [12] adopted mobile sinks to collect sensor data and used a CTDC system to evaluate the trustworthiness of both sensors and mobile sinks. To improve the data transfer environment, Zhu et al. [22]proposed a trust-assisted sensor-cloud (TASC) system that selects trusted sensors in WSNs and trusted data centers in the cloud to constitute the data transfer route from sensor to user. However, there are still many problems to be solved in the data trust level, such as time delays, data level attacks, and data integrity.
In IoT-Cloud, a very large number of connected devices and services emerge, causing network load issues in the centralized cloud architecture. To optimize IoT-Cloud services, Barcelo et al. [23] defined the service distribution problem (SDP) of IoT-Cloud as IoT-CSDP and solve this problem through linear programming. For IoT-Cloud services, one single service cannot meet users’ uncertain requirements. Automatic service compositing is designed and used to realize automatic matching of services and requirements with the goal of fulfilling users’ requirements with the least number of IoT-Cloud services. In a multiple Cloud-based IoT application context, Baker et al. [24] proposed an optimization algorithm to realize energy-aware service composition.
Service optimization problems (SOPs)—problems with service selection and service resource scheduling—are caused by the increasing number of services and increasing variety of requirements. Based on service domain features, Xu et al. [25] proposed a paradigm of service domain-oriented optimization algorithms with artificial bee colony algorithms to solve SOPs effectively. For services in IoT-Cloud systems, there are two issues that deserve more attention to achieve the goal of green and sustainable development; one is that many users require the same data from the cloud and the other is that multiple users request data from the cloud simultaneously. To reduce the resource cost due to these two issues, Zhu et al. [26] proposed an MMDD scheme. In the process of IoT-Cloud systems providing service, many applications require data from different regions, i.e., a single virtual machine (VM) in a particular data center needs to integrate many VSs from different data centers. To ensure high QoS and maintain user satisfaction, Chatterjee et al. [27] designed an optimal decision rule for selecting the appropriate data center, which stores a single VM to serve users.
However, existing schemes have some shortcomings in terms of security management and service provision, such as one-sidedness, low expandability, high resource consumption, large delay, and inefficiency. Moreover, few studies consider the repeated/similar service issues encountered in many fields, such as smart transportation, healthcare, and augmented reality [28], [29]. Edge computing may present a more advantageous platform for solving these issues via an integrated approach; edge computing is an affordable and sustainable computing paradigm to provide many services [30], [31]. For the design, the edge network can reduce the unnecessary communication in the trust evaluation mechanism, maintain the IoT load balance, perform special IoT services, and ensure data transfer reliability. Moreover, the edge network is more suitable for mobile IoT. More fine-grained or integrated service templates are saved in the edge platform, which is flexible and scalable to an increasing number of IoT services. Moreover, many trust evaluation mechanisms can be established in the edge platform, such as the device fault detection, data error detection, and internal attack detection at the data level because edge computing has a lower latency and can identify problems with a smaller computational cost.
SECTION III.
Preliminary
- Trust Evaluation Mechanism
The concept of trust is based on human social relationships. There is no precise definition for such a thing in IoT-Cloud. Zhu et al. [22] proposed a definition in the context of wireless communications.
The trust of a node A in a node B is the subjective expectation of node A receiving positive outcomes from interaction with node B in a specific context.
- Novel Service Architecture
The service architecture of the IoT-Cloud system is divided into three layers: 1) the data collection layer; 2) the data processing layer; and 3) the application service layer, as shown in Fig. 1. In this novel service architecture, the edge network lies in the data collection layer, the edge platform is located in the data processing layer and the application service layer, and the cloud is a part of the application service layer.
Fig. 1.
Typical example for IoT-Cloud service.
The edge network has the following primary advantages.
- Replacing the recommendation/indirect trust.
- Balancing the IoT load dynamically and selecting trusted devices to perform the service by establishing the entire trust state of the IoT.
- Executing special user requirements, such as delay, integrity, and precision.
The edge platform consists of four primary functions.
- Virtualizing physical devices into virtual devices.
- Creating the parameter template Templateparameter and the parsing template Templateparsing in the edge platform.
- Balancing dynamically the cloud load by providing some service on the edge platform.
- Cooperating with the edge network to ensure IoT reliability at the data level.
The cloud mainly performs the following functions.
- Parsing user requirements and finding the related Templateparameter in the cloud, before sending the special digital information to the target edge platforms.
- Cooperating with the edge platform to create a new Templateparsing when there is no corresponding Templateparsing and storing this new Templateparameter .
- Preferentially processing services that have more stringent demands.
- Storing a lot of historical data to be used for deeper data mining and analysis.
- Three Basic Service Scenes
There are three basic service scenes in which the user requirements are limited to one IoT, as shown in Fig. 2. Many mixed-service scenes where the user requirements are based on multiple IoTs can be expressed as combinations of basic scenes, for example smart environment applications, such as smart transportation, healthcare [32], and augmented reality. These smart environment applications have many users and receive a large number of repeated/similar requirements.
Fig. 2.
Three types of service scenes. (a) Service Scene 1. (b) Service Scene 2. (c) Service Scene 3.
In Scene 1, a user requires a service from IoT-1, as shown in Fig. 2(a). The user enters their requirement in an application/Web, and then the application/Web sends this requirement to Edge-1. Edge-1 digitizes this requirement and checks whether there is a corresponding Templateparameter . If there is a Templateparameter , the user requirement is completed by the corresponding Templateparsing in Edge-1. If not, Edge-1 sends the digitized requirement to the cloud. The cloud then cooperates with Edge-1 to establish a new Templateparsing according the specifications of the IoT, such as its functions, limitations, and precision. Finally, the cloud sends Templateparameter to Edge-1.
In Scene 2, the required IoT-2 is closer to IoT-1. If Edge-1 has a Templateparameter for the user’s requirement, the requirement is completed by Edge-1. Edge-1 sends the special digital information to Edge-2 and receives service results from Edge-2. If Edge-1 has no Templateparameter , there are several further steps to satisfy the user’s requirement, as shown in Fig. 2(b). In step 1, the user sends the service requirement to Edge-1. In step 2, Edge-1 digitizes this requirement. In step 3, Edge-1 sends the digitized requirement to the cloud because this requirement is beyond the capability of Edge-1. In step 4, the cloud seeks Templateparameter , sends the special digital information to Edge-2, and informs Edge-2 to communicate with Edge-1. If there is no Templateparameter , the cloud cooperates with Edge-2 to establish a new Templateparsing . Finally, Edge-2 communicates with Edge-1 to send the service results to the user. Edges periodically obtain the latest Templateparameter from the cloud, or the updating is triggered by the users’ service requirements.
In Scene 3, the situation is similar to Scene 2 except that Edge-3 is far away from Edge-1. As there is no Templateparameter in Edge-1, the requirement is completed by performing many steps, as shown in Fig. 2(c). Starting with step 4, the following steps have some differences from those described in Scene 2. In step 4, the cloud seeks a Templateparameter and sends the special digital information to Edge-3. If there is no Templateparameter , the cloud cooperates with Edge-3 to establish a new Templateparsing. In step 5, Edge-3 executes Templateparsing and returns the result to the cloud. Finally, the cloud returns the service result to Edge-1.
SECTION IV.
Design of the Proposed Novel Service Architecture
- Coverage of the Edge Network
The design of IoT in IoT-Cloud systems is usually hierarchical, as shown in Fig. 3. Moreover, mobile IoTs are also based on similar hierarchical architectures. It is ideal that the edge network obtains high effective coverage through fewer edge nodes in the IoT [33]. There are two means of managing edge nodes: 1) the fixed mode and 2) the moving mode.
Fig. 3.
Typical example of IoT.
For the fixed mode, edge nodes are placed in fixed positions of isoheight. However, this mode requires a large number of edge nodes to achieve high coverage.
For the moving mode, edge nodes have a fixed isoheight moving range; this mode needs less edge nodes but has slightly weaker real-time performance. Internal attacks do not occur all the time, so the moving mode is a good choice in certain situations. The key issue associated with this mode is determining how to dispatch edge nodes to move and how to update the trust state of the IoT in the edge network. As an example, there are three isoheights and many edge nodes, such as isoheight−1:(D1,D2 , and D3 ), isoheight−2:(D4,D5,D6,D7,D8 , and D9 ), and isoheight−3:(D10,D11,D12,D13,D14,D15,D16,D17,D18,D19,D20 , and D21 ). Every inner edge node communicates with two outer edge nodes, such as D1with (D4 , D5 ), D2 with (D6 , D7 ), and D4 with (D10 , D11 ). For information interaction in the edge network, the outer edge nodes perform interactions prior to the inner edge nodes. In these circumstances, the inner edge nodes have more comprehensive knowledge regarding the IoT. The information updating is periodic or triggered by great changes, such as devices moving across areas. The general process of information updating is from the outside to the inside, and the inner node is used as the information relay point between two further nodes. If there are abnormal trust states for some devices, inner edge nodes interact with corresponding outer edge nodes to verify and even isolate malicious devices.
- Physical Device Virtualization in the Edge Platform
The virtualization of physical devices is designed to solve the problem that one physical device cannot be shared by multiple applications. For virtualization, it is better to prepare a corresponding virtual device in advance for every physical device; these virtual devices are stored in the edge platform as finer-grained resources. As an example of data sharing, when service parsing templates need to call the physical device, the edge platform allocates corresponding virtual device interfaces to these service parsing templates, as shown in (1). The virtual device sends data to service templates and changes the parameter settings of physical devices according to relevant requirements. The key to virtualization is standardization of the data output format because the data format of physical devices may be heterogeneous, as shown in (2). A virtual device receives heterogeneous data and transforms it into a standard data format. This data is then sent to service templates. Standardization of the data output format is beneficial for further data processing, such as aggregation, integration, and extraction
Devicephysical⇒virtualization⎧⎩⎨⎪⎪Formatdevice−1⋮Formatdevice−n⇒access⇒transformationDevicevirtual⇒interface⎧⎩⎨⎪⎪Service1⋮Servicen⎧⎩⎨⎪⎪Device1virtual⋮DevicenvirtualFormatstandard.(1)(2)
View Source
- Trust Evaluation Mechanism
Table I shows the correspondence relationship between words and abbreviations.
TABLE I List of Abbreviations
1) Trust Evaluation Mechanism in the IoT:
In the IoT, the main body of trust evaluation mechanism is the direct trust Tdirect , which is calculated based on evidences from direct communications among adjacent devices. These evidences may include the device residual energy, the device routing failure rate, the device communication success rate, the device data correctness rate, the device signal strength, and the device forwarding delay. These evidences can be further organized into three categories: 1) the general trust evidence; 2) the network state detection evidence; and 3) the confirmation trust evidence. In every device, the general trust evidence is stored in an array Arrayevidences , which is then used to calculate Tdirect , as
Tdirect=f(xi)=∑i=1nWeighti×f(xi)⎧⎩⎨⎪⎪⎪⎪EvnormalEvtotal,w1×EvnormalEvtotal+w2×TEvold,0,if ∣∣TEvold−EvnormalEvtotal∣∣<Td1if Td1<∣∣TEvold−EvnormalEvtotal∣∣<Td2else(3)
View Sourcewhere, Weighti is the weight value of the i th piece of evidence, which is set according to the importance of the i th piece of evidence. f(xi) is the trust value of the i th piece of evidence, whose value is between 0 and 1. n is the number of needed pieces of evidence, which may vary in different IoT environment. Evnormal is the normal behavior number of times for the i th device, whereas Evtotal is the total monitoring number of times for the ith device. Td1 and Td2 are two thresholds for the difference value between the old trust value and new trust state, and w1 and w2 are two weight values for the old trust value and new trust state, whose values are set according to the monitoring sensitivity. The smaller the values of Td1 and Td2 are, the higher the sensitivity is. If the value of w1 is larger, the value of f(xi) would converge quickly to (Evnormal/Evtotal) in (3).
The network state detection evidence mainly focuses on how to reduce device communication pressure and ensure network load balancing dynamically, such as monitoring the routing failure rate and the communication collision rate to dynamically adjust the data transfer route of Templateparsing . When this type of evidence reveals outliers, they are sent to the edge network as exceptions.
The confirmation trust evidence refers to seriously abnormal behaviors that directly trigger the trust state confirmation procedure in the edge network, such as larger forwarding delays and frequent communication requests. There are two types of exceptions that trigger the trust state confirmation procedure: one is that the difference value shown in (4) is greater than Td3 (a threshold set by the manager) during the direct trust calculation, while the other is that the confirmation trust evidence triggers this procedure
Difference=∣∣Tnewdirect−Tolddirect∣∣.(4)
View Source
2) Trust Evaluation Mechanism in the Edge Network:
The edge network is parallel to the IoT and does not participate in normal IoT data transfer. In the edge network, there is a table in every edge node that stores some information about the devices and trust states, which is used to ensure that the entire IoT is credible, as shown in Table II. Time in Table II is the time since the last trust update.
TABLE II Information About Devices and Trust States
There are a set of rules for the execution of the trust evaluation mechanism in the edge network.
- The edge network periodically updates and stores the trust values of every device. The trust values of every device in the edge network are affected by three aspects: the first aspect is the trust values in the IoT (when the updating period arrives, the edge network selects trust values from trusted devices and calculates the mean trust value for every device); the second aspect is the exceptions from the IoT (when the cumulative amount of these exceptions reaches threshold , trust updating and the trust confirmation procedure are triggered); and the third aspect is the exceptions from the edge platform (when such exceptions happen, the trust value of the corresponding device is temporarily set to 0, and the trust confirmation procedure is triggered).
- In the trust confirmation procedure, the edge network proactively detects the target device’s behavior and monitors environment information to confirm whether the target device’s data is unrealistic.
- For trust values in the IoT, when the updating period arrives, the edge node obtains trust tables from every device in its managing scope. Every trust value in these trust tables is compared with the corresponding final trust value, and trust values beyond the tolerance range of the corresponding final trust value are flagged as outliers. If there is a high fraction of outliers in one trust table, the device is considered to be malicious.
- The physical device does not proactively obtain recommendation trust from the edge network unless there is no trusted device to transmit data or there is a new device in the IoT. If the trust value in the physical device is not very different from the final trust value in the edge network, the edge network will not change the trust value in physical devices.
- For isolating malicious devices, the edge node informs normal devices to remove the route that has malicious devices. The method of isolating malicious devices using the edge network is efficient, accurate, and fast.
3) Trust Evaluation Mechanism in the Edge Platform:
The edge platform ensures data credibility at the data level. If possible, it is more beneficial to collect every physical devices historical trust values to be used in analyses, such as analyzing the relationship between the device performance change curve and the trust value curve, the effect of environment changes on device trust value and the connection between the load and trust state for every part of the IoT. Moreover, the edge platform has the potential to expand further to address the increasing variety of internal attack types.
Some hidden data attackers may behave normally but produce incorrect data causing users to make wrong decisions. Detecting this type of attack is difficult in the IoT because the establishment of this detection mechanism in the IoT consumes more resources, such as communication, computation, and storage. However, the edge platform can use data correlations in the IoT to address hidden data attacks.
- Device data redundancy. For obtaining more precisely integrated and stable data, many IoTs allocate more devices to monitor the same parameter in a certain area. Thus, data from different devices fluctuate within a fixed range. In the edge platform, this data can be picked out and judgments can be performed when the period of detection arrives, as
Tdevice={1,0,if Tdlower<Datadevice<Tdupperelse.(5)
View SourceThe upper limit, Tdupper , and the lower limit, Tdlower , can be obtained from the underlying edge node in this area. If data are out of range, the exception would trigger the detection mechanism.
- Device data gradualness. The monitored target has directionality, which can be orderly sensed by devices in this direction. The topology of the monitoring area is perceived by underlying edge nodes and this topology is then sent to the edge platform. According to the data gradualness and topology, the edge platform can determine the ideal data model, obtain real data from devices, and contrast this data with the ideal data model. If there are many outliers, the corresponding physical devices are considered malicious.
- Some impossibilities. In monitoring areas, there are some barriers that prevent devices from detecting the target although they are close to the target. Thus, if a device breaks this impossibility, it is considered malicious.
Of course, there may be many factors that cause the trust evaluation mechanism to misjudge legitimate devices as malicious devices, such as sudden changes in the environment, temporary failure of devices, and attacks against the trust evaluation mechanism. In most cases, these devices will need to be analyzed based on their previous and future data to determine whether they are malicious. If not, it is necessary to perform trust recovery of these devices via the trust confirmation procedure.
- Service
Since the cloud connects different areas together, services in the cloud can be divided into two categories: 1) local services and 2) remote services. In local services, users’ requirements can be completed locally by the edge platform, whereas in remote services, users’ requirements are completed by the cloud or both the cloud and the edge platform. The selection of local or remote services is determined by the resource consumption Conresource and the total time consumption Contotaltime , as shown in (6). There are several judgment criteria and these are shown in Table III
Conresource=Contotaltime=Constorageresource∩Conprocessingresource∩ConbandwidthresourceContransmissiontime+Contransfertime+Conprocessingtime.(6)
View Source
TABLE III Judgment Criteria
In the above, Constorageresource is the required storage space. Conprocessingresource is the required hardware resource that is used to process data. Conbandwidthresource is the bandwidth required for the user service. The values of the above three factors are 1 or 0. If the value of any factor is 0, the value of Conresource is 0. Contransmissiontime is the time required for data transmission, Contransfertime is the required transfer time spent on routes among the user, cloud and IoT, and Conprocessingtime is the time required for data processing.
To free the edge platform and cloud from addressing the same or similar service requirements, it is better to create service templates (Templateparameter and Templateparsing ) in the cloud and the edge platform. Templateparameter is created in the cloud and focuses on areas, service types, service parameters, etc. Additionally, the edge platform stores Templateparameter to complete local service requirements. Another type of template in the edge platform is Templateparsing , which corresponds to Templateparameter . Templateparsing pays more attention to the IoT, device, parameter setting, basic service parsing template Templatebasicparsing , etc. Templateparameter consists of three parts: 1) the serial number of Templateparameter (corresponding to the digitization of the requirement); 2) the IDcloud (the special serial number that corresponds to that IDedge in Templateparsing ); and 3) the execution command (how the cloud sends IDcloud and where the cloud sends IDcloud ). Templateparsing is composed of three parts: 1) the IDedge ; 2) the number of strategies (one Templateparsing may have several strategies); and 3) a series of commands (the implementation of one strategy). The service process is presented in Algorithm 1, and the result processing is rendered in Algorithm 2.
RUBRIC
Excellent Quality
95-100%
Introduction 45-41 points
The background and significance of the problem and a clear statement of the research purpose is provided. The search history is mentioned.
Literature Support
91-84 points
The background and significance of the problem and a clear statement of the research purpose is provided. The search history is mentioned.
Methodology
58-53 points
Content is well-organized with headings for each slide and bulleted lists to group related material as needed. Use of font, color, graphics, effects, etc. to enhance readability and presentation content is excellent. Length requirements of 10 slides/pages or less is met.
Average Score
50-85%
40-38 points
More depth/detail for the background and significance is needed, or the research detail is not clear. No search history information is provided.
83-76 points
Review of relevant theoretical literature is evident, but there is little integration of studies into concepts related to problem. Review is partially focused and organized. Supporting and opposing research are included. Summary of information presented is included. Conclusion may not contain a biblical integration.
52-49 points
Content is somewhat organized, but no structure is apparent. The use of font, color, graphics, effects, etc. is occasionally detracting to the presentation content. Length requirements may not be met.
Poor Quality
0-45%
37-1 points
The background and/or significance are missing. No search history information is provided.
75-1 points
Review of relevant theoretical literature is evident, but there is no integration of studies into concepts related to problem. Review is partially focused and organized. Supporting and opposing research are not included in the summary of information presented. Conclusion does not contain a biblical integration.
48-1 points
There is no clear or logical organizational structure. No logical sequence is apparent. The use of font, color, graphics, effects etc. is often detracting to the presentation content. Length requirements may not be met
You Can Also Place the Order at www.collegepaper.us/orders/ordernow or www.crucialessay.com/orders/ordernow Analyze the Water Footprint Results