A Review on Identifying Suitable Machine Learning Approach for Internet of Things Applications
Volume-3 | Issue-3
TOWARDS GHZ METALLIC ACCESS NETWORKS
Volume-1 | Issue-1
Analysis of Visible Light Communication using Integrated Avalanche Photodiode
Volume-4 | Issue-2
REVIEW ON UBIQUITOUS CLOUDS AND PERSONAL MOBILE NETWORKS
Volume-1 | Issue-3
Process Control Ladder Logic Trouble Shooting Techniques Fundamentals
Volume-1 | Issue-4
TRUST BASED ROUTING ALGORITHM IN INTERNET OF THINGS (IoT)
Volume-1 | Issue-1
COMPUTATIONAL OFFLOADING FOR PERFORMANCE IMPROVEMENT AND ENERGY SAVING IN MOBILE DEVICES
Volume-1 | Issue-4
Dual Edge-Fed Left Hand and Right Hand Circularly Polarized Rectangular Micro-Strip Patch Antenna for Wireless Communication Applications
Volume-2 | Issue-3
ANALYSIS OF ROUTING PROTOCOLS IN FLYING WIRELESS NETWORKS
Volume-1 | Issue-3
5G Systems with Low Density Parity Check based Chanel Coding for Enhanced Mobile Broadband Scheme
Volume-2 | Issue-1
TRUST BASED ROUTING ALGORITHM IN INTERNET OF THINGS (IoT)
Volume-1 | Issue-1
Hybrid Micro-Energy Harvesting Model using WSN for Self-Sustainable Wireless Mobile Charging Application
Volume-3 | Issue-3
Three Phase Coil based Optimized Wireless Charging System for Electric Vehicles
Volume-3 | Issue-3
Cyber-attack and Measuring its Risk
Volume-3 | Issue-4
Analysis of Solar Power Generation Performance Improvement Techniques
Volume-4 | Issue-3
REVIEW ON UBIQUITOUS CLOUDS AND PERSONAL MOBILE NETWORKS
Volume-1 | Issue-3
Pollination Inspired Clustering Model for Wireless Sensor Network Optimization
Volume-3 | Issue-3
Design of Low Power Cam Memory Cell for the Next Generation Network Processors
Volume-3 | Issue-4
A STUDY OF RESEARCH NOTIONS IN WIRELESS BODY SENSOR NETWORK (WBSN)
Volume-1 | Issue-2
Computation of Constant Gain and NF Circles for 60 GHz Ultra-low noise Amplifiers
Volume-3 | Issue-3
Volume - 4 | Issue - 4 | december 2022
Published
04 January, 2023
Due to the unprecedented increase in the utilization of Internet of Things (IoT) technology, there is a huge increase in network/internet traffic due to which the existing network architectures are facing number of challenges in terms of reliability, availability, scalability, portability and expandability. In order to deal with the challenges, the cyber-twin technology has been recently proposed to assist in establishing a strong communication network in terms of digital asset management, network data maintenance etc. Recently, cyber-twin has become a well-established environment for real-world applications ranging from manufacturing, healthcare to smart city applications. The proposed study reviews the concept of cyber-twin mobile networks along with a representation and efficient utilization of cyber-twin networks and its impact in the digital world. Further, different state-of-the-art cyber-twin architectures are compared to show how these architectures outperform the traditional peer-to-peer networks in order to make the futuristic networks safer, secured, adaptable, portable and reliable.Due to the unprecedented increase in the utilization of Internet of Things (IoT) technology, there is a huge increase in network/internet traffic due to which the existing network architectures are facing number of challenges in terms of reliability, availability, scalability, portability and expandability. In order to deal with the challenges, the cyber-twin technology has been recently proposed to assist in establishing a strong communication network in terms of digital asset management, network data maintenance etc. Recently, cyber-twin has become a well-established environment for real-world applications ranging from manufacturing, healthcare to smart city applications. The proposed study reviews the concept of cyber-twin mobile networks along with a representation and efficient utilization of cyber-twin networks and its impact in the digital world. Further, different state-of-the-art cyber-twin architectures are compared to show how these architectures outperform the traditional peer-to-peer networks in order to make the futuristic networks safer, secured, adaptable, portable and reliable.
KeywordsCyber Twin Internet of Things (IoT) Network security Artificial Intelligence (AI)
Full Article PDF Download Article PDF