Journal articles on the topic 'IoT Internet des objets'

To see the other types of publications on this topic, follow the link: IoT Internet des objets.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'IoT Internet des objets.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Milivojević, Sanja, and Elizabeth Radulski. "The 'Future Internet' and crime: Towards a criminology of the Internet of Things." Crimen 11, no. 3 (2020): 255–71. http://dx.doi.org/10.5937/crimen2003255m.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
The Internet of Things (IoT) is poised to revolutionise the way we live and communicate, and the manner in which we engage with our social and natural world. In the IoT, objects such as household items, vending machines and cars have the ability to sense and share data with other things, via wireless, Bluetooth, or Radio Frequency IDentification (RFID) technology. "Smart things" have the capability to control their performance, as well as our experiences and decisions. In this exploratory paper, we overview recent developments in the IoT technology, and their relevance for criminology. Our aim is to partially fill the gap in the literature, by flagging emerging issues criminologists and social scientists ought to engage with in the future. The focus is exclusively on the IoT while other advances, such as facial recognition technology, are only lightly touched upon. This paper, thus, serves as a starting point in the conversation, as we invite scholars to join us in forecasting-if not preventing-the unwanted consequences of the "future Internet".
2

C. Sailaja. "Industrial Internet of Things – An Overview." December 2022 4, no. 4 (December 30, 2022): 257–71. http://dx.doi.org/10.36548/jismac.2022.4.003.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Internet of Things (IoT) is a network of intelligent objects (smart sensors) that are connected and accessible to the Internet through devices such as routers to exchange data. Many useful applications can be developed using IoT. IoT has brought a change in such a way that everything around us can be turned into smart devices e.g., smart cars, smart homes, smart parking, smart cities etc., thereby connecting human, machine & things seamlessly. The advent of cheaper processing power, communication cost and some marketing have created the IoT of today. When the principles of IoT are applied to Industries, it is termed as Industrial IoT. Smart sensors and Industrial Internet of Things (IIoT) are modern tools which drive Industry 4.0. The use of smart sensors and IIoT have a positive impact in enhancing the quality & value of products and improve efficiency. The combination of smart sensors with its processing & networking capabilities help in transferring the process data to the centralized database for further analysis. Thus, digitalization has helped industry to reimage the business with the transformation brought about by IIoT. This paper discusses some of the applications of IIoT such as Remote Monitoring & Service, AI & ML based predictive analysis and Closed loop Digital twin using IoT sensors.
3

Suryani, Vera, Selo Sulistyo, and Widyawan Widyawan. "Trust-Based Privacy for Internet of Things." International Journal of Electrical and Computer Engineering (IJECE) 6, no. 5 (October 1, 2016): 2396. http://dx.doi.org/10.11591/ijece.v6i5.9678.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
<p>Internet of Things or widely known as IOT makes smart objects become active participants in the communication process between objects and their environment. IoT services that utilize Internet connection require solutions to a new problem: security and privacy. Smart objects and machine-to-machine communications in IOT now become interesting research, including that related to security. Privacy, which is a safe condition in which object is free from interference from other objects, is one of the important aspects in IOT. Privacy can be implemented using various ways for examples by applying encryption algorithms, restrictions on access to data or users, as well as implementing rules or specific policy. Trustable object selection is one technique to improve privacy. The process of selecting a trustable object can be done based on past activities or trust history of the object, also by applying a threshold value to determine whether an object is "trusted" or not. Some researchers have studied this approach. In this study, the selection processes of trustable objects are calculated using Modified Ant Colony algorithm. The simulation was performed and resulted in declining graphic trend but stabilized in certain trust value.</p>
4

Suryani, Vera, Selo Sulistyo, and Widyawan Widyawan. "Trust-Based Privacy for Internet of Things." International Journal of Electrical and Computer Engineering (IJECE) 6, no. 5 (October 1, 2016): 2396. http://dx.doi.org/10.11591/ijece.v6i5.pp2396-2402.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
<p>Internet of Things or widely known as IOT makes smart objects become active participants in the communication process between objects and their environment. IoT services that utilize Internet connection require solutions to a new problem: security and privacy. Smart objects and machine-to-machine communications in IOT now become interesting research, including that related to security. Privacy, which is a safe condition in which object is free from interference from other objects, is one of the important aspects in IOT. Privacy can be implemented using various ways for examples by applying encryption algorithms, restrictions on access to data or users, as well as implementing rules or specific policy. Trustable object selection is one technique to improve privacy. The process of selecting a trustable object can be done based on past activities or trust history of the object, also by applying a threshold value to determine whether an object is "trusted" or not. Some researchers have studied this approach. In this study, the selection processes of trustable objects are calculated using Modified Ant Colony algorithm. The simulation was performed and resulted in declining graphic trend but stabilized in certain trust value.</p>
5

Park, Jong. "Advances in Future Internet and the Industrial Internet of Things." Symmetry 11, no. 2 (February 16, 2019): 244. http://dx.doi.org/10.3390/sym11020244.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
After the emergence of the Internet and mobile communication networks, the IoT has been considered as the third wave of information technology. The Industrial Internet of Things (IIoT) is the use of Internet of Things (IoT) technologies in manufacturing. IIoT incorporates machine learning and big data technology, sensor data, and machine-to-machine (M2M) communications that have existed in industrial areas for years. In the future, people and objects will be connected at any time, any place, with anything and anyone and will utilize any network and services. IIoT is creating a new world in which people and businesses can manage their assets in more informed ways and can make more opportune and better-informed decisions. Many advanced IIoT and 5G technologies have been successfully applied in everyday life, but there are still many practical problems tackled by traditional methods which are generally difficult to experimentally solve in the advanced Industrial Internet of Things. Therefore, in this special issue, we accepted five articles in three different dimensions: communication networks, optimized resource provisioning and data forwarding, privacy and security.
6

Raimundo, Ricardo Jorge, and Albérico Travassos Rosário. "Cybersecurity in the Internet of Things in Industrial Management." Applied Sciences 12, no. 3 (February 2, 2022): 1598. http://dx.doi.org/10.3390/app12031598.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Nowadays, people live amidst the smart home domain, while there are business opportunities in industrial smart cities and healthcare. However, there are concerns about security. Security is central for IoT systems to protect sensitive data and infrastructure, whilst security issues have become increasingly expensive, in particular in Industrial Internet of Things (IIoT) domains. Nonetheless, there are some key challenges for dealing with those security issues in IoT domains: Applications operate in distributed environments such as Blockchain, varied smart objects are used, and sensors are limited, as far as machine resources are concerned. In this way, traditional security does not fit in IoT systems. The issue of cybersecurity has become paramount to the Internet of Things (IoT) and the Industrial Internet of Things (IIoT) in mitigating cybersecurity risk for organizations and end users. New cybersecurity technologies/applications present improvements for IoT security management. Nevertheless, there is a gap in the effectiveness of IoT cyber risk solutions. This review article discusses the literature trends around opportunities and threats in cybersecurity for IIoT, by reviewing 70 key articles discovered from a profound Scopus literature survey. It aims to present the current debate around the issue of IIoT rather than suggesting any particular technical solutions to solve network security problems.
7

Birje, Mahantesh N., Arun A. Kumbi, and Ashok V. Sutagundar. "Internet of Things." International Journal of Hyperconnectivity and the Internet of Things 1, no. 2 (July 2017): 45–71. http://dx.doi.org/10.4018/ijhiot.2017070104.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
This article describes how the Internet of Things (IoT) enables interaction and integration of real world things or objects—such as cars, electronic devices, homes, etc.—using various inter-operable communication protocols. This leads to a digital society of billions of devices that can sense, process, share, track, shop, chat and work in cooperative manner. There exist many challenges in the realization of IoT based distributed systems. This article intends to introduce various aspects of IoT such as views/visions, Architecture and protocols of IoT, communication technology, general requirements and various application domains. This article intends to disseminate the state-of-the-art multi-fold information on IoT to researchers, academicians, and student community.
8

Long, Rong, Xiaohui Fan, Kai Wei, Junxuan Bai, and Shanpeng Xiao. "Internet-of-Things object model." Digital Twin 2 (April 12, 2022): 5. http://dx.doi.org/10.12688/digitaltwin.17562.1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Background: With the advancement of communication technology and advanced sensors, there are massive demands for Internet-of-Things (IoT) applications in buildings, communities, factories, parks, etc. Accessing IoT devices provides convenience for scene management and monitoring, ameliorating production and life intelligently. However, due to the lack of a unified model for IoT devices, data is often skipped over IoT platforms and transmitted to applications directly. This leads to the fact that each manufacturer needs to produce its devices and develop its customized software, which hugely increases the development cycle. On the other hand, it is difficult to convey information between different systems, limiting cross- system control. Moreover, digital twin relies on large amounts of heterogeneous data, and it is impracticable to provide enough data without a unified model for device description. Methods: First, we illustrate the motivation, design goals, and design principles for creating the Internet-of-Things Object Model (IoT-OM). Then we propose a unified description to define IoT devices. The proposed concept has been accepted by several companies, and we analyse one platform that adopts the model. To demonstrate the effectiveness of the model, we introduce two projects based on the platform. One project is an intelligent fire protection system, and another project is an intelligent air quality monitoring system. Results: We measured the time taken by five companies when developing IoT devices and their applications, including the development cycle duration without utilizing the proposed model and the duration using the model at China Mobile’s OneNET platform. The results prove that the proposed model can significantly shorten the development cycle. Conclusions: This paper proposes a model for IoT devices, which helps to unify heterogeneous data among different manufacturers and helps to shorten the development cycles for developers.
9

E, Umamaheswari, and Ajay Dm. "SCOPE OF INTERNET OF THINGS: A SURVEY." Asian Journal of Pharmaceutical and Clinical Research 10, no. 13 (April 1, 2017): 187. http://dx.doi.org/10.22159/ajpcr.2017.v10s1.19633.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
The advent of internet of things (IoT) has influenced and revolutionized the information systems and computing technologies. A computing conceptwhere physical objects used in daily life, will identify themselves by getting connected to the internet is called IoT. Physical objects embedded withelectronic, software, radio-frequency identification, sensors, actuators and smart objects converge with the internet to accumulate and share datain IoT. IoT is expected to bring in drastic changes and solutions to most of the daily problems in the real world. This paper explains in detail the keyconcepts of IoT, the applications of IoT, the challenges in establishing IoT. This work also explains in detail the future scope of IoT in different fields.
10

Susanto, Fredy, Ni Komang Prasiani, and Putu Darmawan. "IMPLEMENTASI INTERNET OF THINGS DALAM KEHIDUPAN SEHARI-HARI." Jurnal Imagine 2, no. 1 (April 21, 2022): 35–40. http://dx.doi.org/10.35886/imagine.v2i1.329.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
ABSTRACT Internet of Things or abbreviated as IoT is a technology that innovates surrounding objects with the internet so that daily activities become easier and more efficient. The Internet of Things is a technology that allows objects around us to be connected to the Internet. The importance of the Internet of Things can be seen with the increasing number of applications in various lines of life today. IoT gives us many ideas to participate in various aspects of development ranging from micro to macro around the world. The internet of things has made it a separate field of research since the development of internet technology (IT) and other communication media. The methodology used in the development of IoT is of various kinds. From the real time system to the use of the prototype flow. The more human needs about technology are developing, the more research will be present, the internet of things is one of the thoughts of researchers who optimize several tools such as sensor media, Radio Frequency Identification (RFID), Wireless Sensor Networks and other Smart Objects that allow humans easy to interact with all equipment connected to the internet network. Keywords: IoT, RFID, Wireless Sensor Network, Smart Object ABSTRAK Internet of Things atau disingkat dengan istilah IoT merupakan teknologi yang menginovasi benda-benda sekitar dengan internet agar aktivitas sehari-hari menjadi lebih mudah dan efisien. Internet of Things adalah teknologi yang memungkinkan benda-benda di sekitar kita terhubung dengan Internet. Pentingnya Internet of Things dapat dilihat dengan semakin banyaknya diterapkan dalam berbagai lini kehidupan saat ini. IoT memberikan kita banyak gagasan untuk turut berperan serta dalam berbagai segi perkembangan mulai dari hal mikro hingga makro di seluruh dunia. Internet of things menjadikannya sebuah bidang penelitian tersendiri sejak berkembangnya teknologi internet (IT) dan media komunikasi lain. Metodology yang yang digunakan dalam pengembangan IoT ini adalah berbagai macam. Dari yang real time system hingga penggunaan alur prototype. Semakin berkembang keperluan manusia tentang teknologi, maka semakin banyak penelitian yang akan hadir, internet of things adalah salah satu hasil pemikiran para peneliti yang mengoptimasi beberapa alat seperti media sensor, Radio Frequency Identification (RFID), Wireless Sensor Network serta Smart Object lain yang memungkinkan manusia mudah berinteraksi dengan semua peralatan yang terhubung dengan jaringan internet. Kata kunci : IoT, RFID, Wireless Sensor Network, Smart Object
11

Phupattanasilp, Pilaiwan, and Sheau-Ru Tong. "Augmented Reality in the Integrative Internet of Things (AR-IoT): Application for Precision Farming." Sustainability 11, no. 9 (May 9, 2019): 2658. http://dx.doi.org/10.3390/su11092658.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Benefitted by the Internet of Things (IoT), visualization capabilities facilitate the improvement of precision farming, especially in dynamic indoor planting. However, conventional IoT data visualization is usually carried out in offsite and textual environments, i.e., text and number, which do not promote a user’s sensorial perception and interaction. This paper introduces the use of augmented reality (AR) as a support to IoT data visualization, called AR-IoT. The AR-IoT system superimposes IoT data directly onto real-world objects and enhances object interaction. As a case study, this system is applied to crop monitoring. Multi-camera, a non-destructive and low-cost imaging platform of the IoT, is connected to the internet and integrated into the system to measure the three-dimensional (3D) coordinates of objects. The relationships among accuracy, object coordinates, augmented information (e.g., virtual objects), and object interaction are investigated. The proposed system shows a great potential to integrate IoT data with AR resolution, which will effectively contribute to updating precision agricultural techniques in an environmentally sustainable manner.
12

Yukari Kikuchi, Alissa, Lucas Antonio Betteri, and Liriane Soares Araújo. "IOT – INTERNET DAS COISAS." Revista Interface Tecnológica 18, no. 2 (May 14, 2022): 118–30. http://dx.doi.org/10.31510/infa.v18i2.1211.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
A corrida para novos avanços tecnológicos está cada vez mais intenso, a fim de atender a demanda que tem se habituado entre as pessoas em realizar tarefas de forma progressivamente acelerada. Com este rumo que a sociedade propende em obter cada vez mais praticidade, eficiência e economia de tempo, gera a relevância em explorar sobre a definição da Internet das Coisas (IoT) e seus recursos e funcionamento. Desta forma, este artigo consiste em investigar e situar sobre a IoT, bem como apresentar seu conceito, evolução, benefícios e impactos, com a finalidade de compreender o contexto, objetos e áreas de aplicação e analisar até em que ponto esta tecnologia é aplicável, ampliando de um modo geral o conhecimento sobre a Internet das Coisas
13

Afrozah Nadeem. "Application of Internet of Things for Smart City and Environmental Solutions." Lahore Garrison University Research Journal of Computer Science and Information Technology 4, no. 2 (June 25, 2020): 105–16. http://dx.doi.org/10.54692/lgurjcsit.2020.0402137.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Internet of Things (IoT) is the latest concept and considered the essential infrastructure for smart cities. However, IoT is allowing smart cities to take the initiative of starting different projects and its deployment all over the world. For Information & Communication Technologies (ICT) solutions, IoT is a compatible way to combine the numerous sensors. Communication of the Internet of Things is the soul of the smart cities. The scopeof IoT in smart cities is connected and deployed with over 50 billion objects this year and more in the future too. This paper deals with concern regarding IoT globally and a detailed review of the idea of IoT with the smart city encouragement and its applications. Furthermore, the paper presents the main gap, instability, and challenges of implementing the IoT with smart cities on technological standards.
14

Elhaloui, Loubna, Sanaa El Filali, El Habib Benlahmer, Mohamed Tabaa, Youness Tace, and Nouha Rida. "Machine learning for internet of things classification using network traffic parameters." International Journal of Electrical and Computer Engineering (IJECE) 13, no. 3 (June 1, 2023): 3449. http://dx.doi.org/10.11591/ijece.v13i3.pp3449-3463.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
With the growth of the internet of things (IoT) smart objects, managing these objects becomes a very important challenge, to know the total number of interconnected objects on a heterogeneous network, and if they are functioning correctly; the use of IoT objects can have advantages in terms of comfort, efficiency, and cost. In this context, the identification of IoT objects is the first step to help owners manage them and ensure the security of their IoT environments such as smart homes, smart buildings, or smart cities. In this paper, to meet the need for IoT object identification, we have deployed an intelligent environment to collect all network traffic traces based on a diverse list of IoT in real-time conditions. In the exploratory phase of this traffic, we have developed learning models capable of identifying and classifying connected IoT objects in our environment. We have applied the six supervised machine learning algorithms: support vector machine, decision tree (DT), random forest (RF), k-nearest neighbors, naive Bayes, and stochastic gradient descent classifier. Finally, the experimental results indicate that the DT and RF models proved to be the most effective and demonstrate an accuracy of 97.72% on the analysis of network traffic data and more particularly information contained in network protocols. Most IoT objects are identified and classified with an accuracy of 99.21%.
15

Benmammar, Badr. "Internet of Things and Cognitive Radio." International Journal of Organizational and Collective Intelligence 11, no. 1 (January 2021): 39–52. http://dx.doi.org/10.4018/ijoci.2021010103.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Internet of things (IoT) is a worldwide network of interconnected objects. However, the things-oriented, internet-oriented, semantic-oriented, and tactile-oriented versions of IoT are meaningless if the IoT objects are not equipped with intelligence. For this, current research trends are oriented towards cognitive radio. This paper presents IoT, its definition, its potential applications, its challenges, as well as its enabling technologies. Among these technologies, particular importance is given to cognitive radio. The overall objective of this paper is to make a global synthesis on the motivations as well as on the challenges to be raised by the integration of cognitive radio in IoT in order to serve as self-reconfigurable solutions for a certain number of IoT applications.
16

Dinh, Ngoc-Thanh, and Young-Han Kim. "An Efficient Correlation-Based Cache Retrieval Scheme at the Edge for Internet of Things." Sensors 20, no. 23 (November 30, 2020): 6846. http://dx.doi.org/10.3390/s20236846.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Existing caching mechanisms considers content objects individually without considering the semantic correlation among content objects. We argue that this approach can be inefficient in Internet of Things due to the highly redundant nature of IoT device deployments and the data accuracy tolerance of IoT applications. In many IoT applications, an approximate answer is acceptable. Therefore, a cache of an information object having a high semantic correlation with the requested information object can be used instead of a cache of the exact requested information object. In this case, caching both of the information objects can be inefficient and redundant. This paper proposes a caching retrieval scheme which considers the semantic information correlation of information objects of nodes for cache retrieval. We illustrate the benefits of considering the semantic information correlation in caching by studying IoT data caching at the edge. Our experiments and analysis show that semantic correlated caching can significantly improve the efficiency, cache hit, and reduce the resource consumption of IoT devices.
17

Naderlou, Lida, Nigar Ismayilova, and Azar Feyziyev. "A REVIEW SIOT (SOCIAL INTERNET OF THINGS): TECHNIQUES, APPLICATIONS, CHALLENGES AND TRENDS." Azerbaijan Journal of High Performance Computing 5, no. 2 (December 31, 2022): 236–53. http://dx.doi.org/10.32010/26166127.2022.5.2.236.253.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
The social or human actions in the IoT platform derive the new paradigm in the IoT environment called the Social Internet of Things (SIoT). The Social Internet of Things is that part of an IoT capable of establishing social relationships with other objects concerning humans. SIoT attempts to moderate IoT challenges in scalability, trust, and resource discovery by taking a cue from social computing. In the IoT family, there is a subset of SIoT, a relatively recent concept. Moreover, a method of integrating IoT with social networking. SIoT is a simulation of human-to-human and object-to-object social networks where Humans are called intellectual and relational objects. They build their social network to accomplish shared objectives such as enhancing accessibility, success, and productivity and providing their needed services. This paper has extensively surveyed the SIoT (social Internet of things) for beginners involved in SIoT Studies. This paper gives you a clear view and ideas about SIoT's architecture, relationships, trust management, and applications and challenges implemented related to SIoT.
18

Singh, Om Prakash, Ranjith Ranjith C. S, Karthik R., Sandeep Reddy, and Rashmi Soni. "Survey Report on Sending Data Securely using IOT Over Cloud." International Journal of Recent Technology and Applied Science 2, no. 1 (March 18, 2020): 75–80. http://dx.doi.org/10.36079/lamintang.ijortas-0201.76.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Survey Report on Sending Data Securely using IOT Over Cloud The Internet of Things (IOT) is the network of physical objects, computers, cars, houses, and other things embedded with electronics, software, sensors, and network connectivity, allowing these objects to collect and exchange data. In the new technology market, IOT innovations is the next major step, but with the big difference that it brings about massive changes in business usability. A flare in the number of connected devices as well as placed locations is anticipated over the next few years and the functions that they will perform. Due to recent developments in networking and sensor technology, the Internet of Things (IoT) has grown rapidly. It seems very difficult to link that object together through the internet, but within a time frame, the internet of things will change our lives dramatically.
19

Jumaa, Noor. "Survey: Internet of Thing Using FPGA." Iraqi Journal for Electrical and Electronic Engineering 13, no. 1 (June 1, 2017): 38–45. http://dx.doi.org/10.37917/ijeee.13.1.5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Everything in its way to be computerized and most of the objects are coming to be smart in present days. Modern Internet of Thing (IoT) allows these objects to be on the network by using IoT platforms. IoT is a smart information society that consists of smart devices; these devices can communicate with each other without human's intervention. IoT systems require flexible platforms. Through the use of Field Programmable Gate Array (FPGA), IoT devices can interface with the outside world easily with low power consumption, low latency, and best determinism. FPGAs provide System on Chip (SoC) technique due to FPGAs scalability which enables the designer to implement and integrate large number of hardware clocks at single chip. FPGA can be deemed as a special purpose reprogrammable processor since it can process signals at its input pins, manipulate them, and give off signals on the output pins. In this paper, using FPGA for IoT is the limelight.
20

Jumaa, Noor. "Survey: Internet of Thing Using FPGA." Iraqi Journal for Electrical and Electronic Engineering 13, no. 1 (June 1, 2017): 38–45. http://dx.doi.org/10.37917/ijeee.13.5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Everything in its way to be computerized and most of the objects are coming to be smart in present days. Modern Internet of Thing (IoT) allows these objects to be on the network by using IoT platforms. IoT is a smart information society that consists of smart devices; these devices can communicate with each other without human's intervention. IoT systems require flexible platforms. Through the use of Field Programmable Gate Array (FPGA), IoT devices can interface with the outside world easily with low power consumption, low latency, and best determinism. FPGAs provide System on Chip (SoC) technique due to FPGAs scalability which enables the designer to implement and integrate large number of hardware clocks at single chip. FPGA can be deemed as a special purpose reprogrammable processor since it can process signals at its input pins, manipulate them, and give off signals on the output pins. In this paper, using FPGA for IoT is the limelight.
21

Salukhe, Adarsh. "Internet of Things." International Journal for Research in Applied Science and Engineering Technology 11, no. 9 (September 30, 2023): 1062–69. http://dx.doi.org/10.22214/ijraset.2023.55710.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Abstract: The Internet of Things (IoT) is a trend emerging in information and communication technologies, and it has been ubiquitous for the last two decades. What do you mean by “Things”? A hardware device or an object of the physical world connected to the Internet is IOT. The Internet of Things (IoT) works for end-user devices, Mobile, Tablets, laptops, desktops, etc. In recent years, there has been an increasing number of broader devices connected to networks, including vehicles, smartphones, medical units, household devices, smart televisions, etc.
22

Ramu, Sridarala, and Daniel Osaku. "New Approach Securing the Internet of Things." International Journal of Information Technology and Applied Sciences (IJITAS) 2, no. 1 (January 31, 2020): 7–13. http://dx.doi.org/10.52502/ijitas.v2i1.8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
IOT connected objects are new technologies used to connect objects to the internet and to users. The IOT influences our daily life in several fields such as logistics, health, energy, intelligent vehicles, the smart home or the smart city ... Subsequently, following the specific characteristics of the different areas of use, a multitude IOT applications have been developed and deployed using different IOT frameworks. An IOT framework is a set of rules, protocols and standards that simplify the implementation of IOT applications. The proper functioning and success of these applications depends on the characteristics of the framework, and also on the security mechanisms used. In this article, we will discuss the frameworks used by presenting the proposed architecture of each framework, the compatible hardwares and softwares and the security mechanisms used, then a comparative study of these frameworks will be presented. Finally, we will propose an architecture of a secure IOT framework.
23

Kumar, Sumit, and Zahid Raza. "Internet of Things." International Journal of Systems and Service-Oriented Engineering 7, no. 3 (July 2017): 32–52. http://dx.doi.org/10.4018/ijssoe.2017070103.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Internet of Things (IoT) is a novel approach of connecting things/objects and thus transmitting information between various entities of the physical world or to the control centers where this information can be interpreted. IoT has been poised as the next evolution of internet promising to change our lives by involving a seamless access to people and devices in a ubiquitous way leading to a smart world. These devices, often referred to as smart items or intelligent things can be home appliances, healthcare devices, vehicles, buildings, factories and almost anything networked and fitted with sensors, actuators, and/or embedded computers. IoT promises to make the world smarter and proactive by enabling things to talk and others to understand. This work first presents an insight into the origin of IoT and its network as well as data centric architecture while listing the major possibilities. The seemingly important role and challenges of using Wireless Sensor Networks (WSN) which acts as the base in sensing and monitoring has been discussed. Since, the future lies in utility computing, best realized in the form of cloud computing, a cloud centric view of IoT is also presented.
24

Arora, Jyoti, Pooja Kherwa, and Meena Tushir. "A comprehensive survey on the significance of industrial Internet of Things, energy management and big data analytics." Journal of Information and Optimization Sciences 45, no. 2 (2024): 247–56. http://dx.doi.org/10.47974/jios-1544.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
The adaptive worldwide network architecture made up of web-enabled, objects connected through internet generally defines the concept of Internet of Things (IoT). In today’s world, IoT is contributing towards the transformation of the traditional industries to the smart industries by integrating the concept of IoT based energy management system into the analytics-based information system of the industries. Manufacturing businesses have concluded that by providing a digital identity to their tangible resources through IoT-based solutions, they can gain higher clarity into their processes and massively improve them. To estimate and analyze the developments in this field, this paper conducts an in-depth survey on the significance of big data analytics and energy management in shaping the progress of the Industrial Internet of Things (IIoT). It briefs the components related to the building blocks of the IoT, its application in various domains, benefits and the major challenges faced for building IoT technologies. This review present cutting-edge research on how IoT technology adoption might propel the transformation of industrial companies that are energy-efficient and environmentally sustainable.
25

Et. al., Harish Kumar N,. "Mutual authentication and data security in IOT using hybrid mac id and elliptical curve cryptography." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 11 (May 10, 2021): 501–7. http://dx.doi.org/10.17762/turcomat.v12i11.5913.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Internet of Things (IoT) is a new emergent technology of the Internet. The Internet that we use today runs with human interposing. The Internet of Things which is the extended version of the internet which aims to offer the machine to machine communication or the device may be referred to as objects we call it object to object communication, which is without the involvement of the humans. With the growth of IOT in the market there are many considerable subjects relating to privacy, authentication, data confidentiality, data protection and other problems where solutions to these issues to be derived. This paper works on providing Mutual authentication and data security. A light weight Approach has been employed by generating Hybrid MAC ID for mutual authentication and using Elliptical Curve for secure data transfer which provides authentication and data confidentiality in the IoT Network.
26

Laguidi, Ahmed, Samiya Tamtam, and Youssef Mejdoub. "A technique to improve IoT connectivity based on NB-IoT and D2D communications." ITM Web of Conferences 52 (2023): 01010. http://dx.doi.org/10.1051/itmconf/20235201010.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
The Internet of Things (IoT) can be defined as an environment in which object communicates with others objects to serve a meaningful purpose. The IoT is currently one of the unprecedented research areas for professionals and researchers. Every day, the unlimited benefits that it can bring to our lives and the demand for this technology is increasing. The IoT technology has the ability to improve our quality of life by connecting many objects, which we use, to communicate and cooperate. Indeed, it is possible to enable new applications, services and business opportunities in global sectors such as Smart Cities, Smart environment, Energy conservation, Home automation, Precise Agriculture, among others. This paper presents a brief overview of the IoT and provides a technique of IoT that can improve the connectivity of the objet. Our proposals consist in taking advantage of the extended coverage of the NB-IoT to extend the coverage of the Wi-Fi zone which does not exceed a few meters.
27

Jiang, Linshan, Rui Tan, Xin Lou, and Guosheng Lin. "On Lightweight Privacy-preserving Collaborative Learning for Internet of Things by Independent Random Projections." ACM Transactions on Internet of Things 2, no. 2 (May 2021): 1–32. http://dx.doi.org/10.1145/3441303.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
The Internet of Things (IoT) will be a main data generation infrastructure for achieving better system intelligence. This article considers the design and implementation of a practical privacy-preserving collaborative learning scheme, in which a curious learning coordinator trains a better machine learning model based on the data samples contributed by a number of IoT objects, while the confidentiality of the raw forms of the training data is protected against the coordinator. Existing distributed machine learning and data encryption approaches incur significant computation and communication overhead, rendering them ill-suited for resource-constrained IoT objects. We study an approach that applies independent random projection at each IoT object to obfuscate data and trains a deep neural network at the coordinator based on the projected data from the IoT objects. This approach introduces light computation overhead to the IoT objects and moves most workload to the coordinator that can have sufficient computing resources. Although the independent projections performed by the IoT objects address the potential collusion between the curious coordinator and some compromised IoT objects, they significantly increase the complexity of the projected data. In this article, we leverage the superior learning capability of deep learning in capturing sophisticated patterns to maintain good learning performance. Extensive comparative evaluation shows that this approach outperforms other lightweight approaches that apply additive noisification for differential privacy and/or support vector machines for learning in the applications with light to moderate data pattern complexities.
28

Poonkuzhal, S., M. Shobana, and J. Jeyalakshmi. "A deep transfer learning approach for IoT/IIoT cyber attack detection using telemetry data." Neural Network World 33, no. 4 (2023): 225–44. http://dx.doi.org/10.14311/nnw.2023.33.014.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
The rise of internet connectivity across the globe increases the count of IoT (internet of things)/IIoT (industrial internet of things) devices exponentially. The objects/devices which are connected to the internet are always prone to malicious attacks at various levels, such as physical, network, fog, and applications, which exist in the IoT architecture. Many researchers have addressed this issue and designed their own solutions based on machine and deep learning techniques. It is undeniable that deep learning outperforms machine learning (ML), but it necessitates a massive amount of datasets with appropriate labels. In this work, the deep transfer learning (TL) technique has been adapted for gated recurrent unit (GRU). Each model is trained using a dataset that belongs to one source IoT device (source domain), and this trained model is used to classify the malicious traffic in another dataset that belongs to some other IoT device (target domain). This approach is used for binary classification. These transfer learning models have been evaluated using an IoT/IIoT telemetry dataset called ToN IoT which comprises the sensor data generated from the seven different types of IoT devices. The highest accuracy achieved by IoT garage door was upto 99.76% as a source domain by fixing IoT thermostat as target domain. These models were also evaluated using some more metrics such as precision, recall, F1-measure, training time and testing time. By implementing transfer learning based GRU model, the accuracy of the model is improved from 69.20% to 99.76%. Moreover, to prove the efficiency of the proposed model, it is compared with state of art deep learning model and its results were analyzed in a detailed manner.
29

Cirillo, Flavio, Fang-Jing Wu, Gürkan Solmaz, and Ernö Kovacs. "Embracing the Future Internet of Things." Sensors 19, no. 2 (January 16, 2019): 351. http://dx.doi.org/10.3390/s19020351.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
All of the objects in the real world are envisioned to be connected and/or represented, through an infrastructure layer, in the virtual world of the Internet, becoming Things with status information. Services are then using the available data from this Internet-of-Things (IoT) for various social and economical benefits which explain its extreme broad usage in very heterogeneous fields. Domain administrations of diverse areas of application developed and deployed their own IoT systems and services following disparate standards and architecture approaches that created a fragmentation of things, infrastructures and services in vertical IoT silos. Coordination and cooperation among IoT systems are the keys to build “smarter” IoT services boosting the benefits magnitude. This article analyses the technical trends of the future IoT world based on the current limitations of the IoT systems and the capability requirements. We propose a hyper-connected IoT framework in which “things” are connected to multiple interdependent services and describe how this framework enables the development of future applications. Moreover, we discuss the major limitations in today’s IoT and highlight the required capabilities in the future. We illustrate this global vision with the help of two concrete instances of the hyper-connected IoT in smart cities and autonomous driving scenarios. Finally, we analyse the trends in the number of connected “things” and point out open issues and future challenges. The proposed hyper-connected IoT framework is meant to scale the benefits of IoT from local to global.
30

Busanelli, Stefano, Simone Cirani, Lorenzo Melegari, Marco Picone, Mirco Rosa, and Luca Veltri. "A Sidecar Object for the Optimized Communication Between Edge and Cloud in Internet of Things Applications." Future Internet 11, no. 7 (July 5, 2019): 145. http://dx.doi.org/10.3390/fi11070145.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
The internet of things (IoT) is one of the most disrupting revolutions that is characterizing the technology ecosystem. In the near future, the IoT will have a significant impact on people’s lives and on the design and developments of new paradigms and architectures coping with a completely new set of challenges and service categories. The IoT can be described as an ecosystem where a massive number of constrained devices (denoted as smart objects) will be deployed and connected to cooperate for multiple purposes, such a data collection, actuation, and interaction with people. In order to meet the specific requirements, IoT services may be deployed leveraging a hybrid architecture that will involve services deployed on the edge and the cloud. In this context, one of the challenges is to create an infrastructure of objects and microservices operating between both the edge and in the cloud that can be easily updated and extended with new features and functionalities without the need of updating or re-deploying smart objects. This work introduces a new concept for extending smart objects’ support for cloud services, denoted as a sidecar object. A sidecar object serves the purpose of being deployed as additional component of a preexisting object without interfering with the mechanisms and behaviors that have already been implemented. In particular, the sidecar object implementation developed in this work focuses on the communication with existing IoT cloud services (namely, AWS IoT and Google Cloud IoT) to provide a transparent and seamless synchronization of data, states, and commands between the object on the edge and the cloud. The proposed sidecar object implementation has been extensively evaluated through a detailed set of tests, in order to analyze the performances and behaviors in real- world scenarios.
31

Aldelaimi, Monira N., M. Anwar Hossain, and Mohammed F. Alhamid. "Building Dynamic Communities of Interest for Internet of Things in Smart Cities." Sensors 20, no. 10 (May 25, 2020): 2986. http://dx.doi.org/10.3390/s20102986.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
The Internet of things (IoT) is a growing area of research in the context of smart cities. It links a city’s physical objects that are equipped with embedded sensing, communicating, and computing technology. These objects possess the capability to connect and share data with minimal human intervention, which creates the potential to establish social relationships among them. However, it is challenging for an object to discover, communicate, and collaborate dynamically with other objects, such as social entities, and provide services to humans. This is due to the increase in the number of objects and the complexity in defining social-like relationships among them. The current research aims to address this by introducing an object architecture and defining a Dynamic Community of Interest Model (DCIM) for IoT objects. The proposed model will help IoT objects to socialize and build communities amongst themselves based on different criteria. In this approach, objects belonging to a community will collaborate with each other to collect, manipulate, and share interesting content and provide services to enhance the quality of human interactions in smart cities.
32

Ane, Tanjea, Masum Billah, and Tabatshum Nepa. "Performance of Internet of Things (IoT) Potential Applications in Education." Bangladesh Journal of Multidisciplinary Scientific Research 2, no. 2 (July 10, 2020): 10–16. http://dx.doi.org/10.46281/bjmsr.v2i2.653.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Internet of Things (IoT) very fast growing interaction that has connected real and virtual objects anytime, anywhere though network. A variety of various connected objects influence the applications of education process which is like a new change with research opportunities and possibilities. In education ecosystem IoT emerges as rapidly dynamic technology for the improvement of traditional education system. This paper consists of five parts: firstly an overview of IoT use, secondly IoT application in education system, thirdly recent survey IoT work then discusses IoT impacts in the higher education and concludes the paper.
33

Mashal, Ibrahim, and Osama Alsaryrah. "Fuzzy analytic hierarchy process model for multi-criteria analysis of internet of things." Kybernetes 49, no. 10 (November 18, 2019): 2509–20. http://dx.doi.org/10.1108/k-11-2018-0592.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Purpose Nowadays, there are various internet of things (IoT) applications covering many aspects of daily life. Many people own numerous smart objects that use these IoT applications. The purpose of this study is determining suitable IoT applications for each user which is a relevant challenge because it is amulti-criteria decision-making. Design/methodology/approach To solve this challenge, the authors propose fuzzy analytical hierarchy process model. Based on the opinions of IoT experts, the model and the hierarchy were designed to assess and compare three crucial IoT criteria, namely, object, application and providers. Findings The results indicated that the application criterion is far more relevant for users other than the two criteria. The findings of this study offer insights into more effective decision-making for IoT application developers and providers. Originality/value This study contributes to the IoT through proposing a fuzzy model to classify IoT applications. The findings provide meaningful implications for IoT application providers.
34

Poolayi, Somayyeh, and Amir H. Assadiyan. "Governance of IoT in order to Move ahead of the calendar & live the future today." Journal of Management and Accounting Studies 8, no. 3 (September 29, 2020): 38–42. http://dx.doi.org/10.24200/jmas.vol8iss3pp38-42.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
The Internet of Things (IoT) is a system of interrelated computing devices, mechanical and digital machines, objects, animals or people that are provided with unique identifiers and the ability to transfer data over a network without requiring human-to-human or human-to-computer interaction. The Internet of Things (IoT) world may be exciting, but there are serious technical challenges that need to address, especially by developers. In this handwriting, learn how to meet the security, analytics, and testing requirements for IoT applications. A thing, in the Internet of Things, can be a person with a heart monitor implant, a farm animal with a biochip transponder, an automobile that has built-in sensors to alert the driver when tire pressure is low -- or any other natural or man-made object that can be assigned an IP address and provided with the ability to transfer data over a network. IoT has evolved from the convergence of wireless technologies, micro-electromechanical systems (MEMS), micro services and the internet. The convergence has helped tear down the silo walls between operational technologies (OT) and information technology (IT), allowing unstructured machine-generated data to analyze for insights that will drive improvements. The Internet of things (IoT) is the interconnection via the Internet of computing devices embedded in everyday objects, enabling them to send and receive data. If one thing can prevent the Internet of things from transforming the way we live and work, it will be a breakdown in security. Therefore, there are some important challenges in privacy and maintaining security of the Internet of things. In this paper, we are going to list the typical items which can be major challenges facing IoT.
35

Li, Xiao Jing, and Yan Hui Hu. "Discussion of Principle and Application for Internet of Things." Applied Mechanics and Materials 347-350 (August 2013): 3322–25. http://dx.doi.org/10.4028/www.scientific.net/amm.347-350.3322.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
The concept of Internet of Things (IoT) is opening new horizons in systems intelligence, where physical objects (embedded with sensory, identification and networking capabilities) can interact with other objects through the global infrastructure of wireless/wired Internet. These systems can be monitored and controlled by filtering and processing collected data. Such intelligent design will naturally result in efficient and cost effective systems. The concept of IOT and the architecture of IOT are discussed. The key technologies of IOT, including Radio Frequency Identification technology, Electronic Product Code technology are analyzed. The framework of digital agriculture application based on IOT is proposed.
36

Gherbi, Chirihane. "Internet of Things and Heterogeneous Networks Technologies: Concepts, Challenges and Perspectives." Ingénierie des systèmes d information 26, no. 4 (August 31, 2021): 403–8. http://dx.doi.org/10.18280/isi.260408.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
The IoT network is used to provide an object with connectivity to the Internet to allow the feedback of information. The IoT has the ambition to make objects interact with each other and with people. It promises to be the engine of great transformations in the lives of individuals by democratizing new uses and services in the mobility sector. This is why it is compared to the internet of the future. The global size of the IoT, the huge number of Things in the IoT, the changing topology of the IoT, and the resource constraints make routing in the IoT difficult. Routing is a necessary process in the Internet of Things because it enables the interchange of data between Things by quickly guiding and reliably delivering data through the network from its origins to its destinations. The Internet of Things is enabled by key pillars: radio frequency identification (RFID) and wireless sensor networks (WSNs) (IoT), NFC (Near Field Communication), BLE (Bluetooth Low-Energy technology), LoRa and Sigfox. This paper examines these different technologies as well as the barriers and challenges that must be solved.
37

Masyhur, Zulkarnaim, Firmansyah Ibrahim, and Didit Hermawan. "Internet of Things (IoT): Security, Threats and Countermeasures." Journal Software, Hardware and Information Technology 2, no. 2 (June 30, 2022): 15–20. http://dx.doi.org/10.24252/shift.v2i2.31.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Internet of Things (IoT) is a technology that is very popular lately and is starting to get busy in Indonesia, marked by various cellphone manufacturers building an IoT ecosystem. IoT can help connect objects such as sensors, vehicles, hospital instruments, household appliances and others. However, connecting these smart devices to the internet network causes various data security problems because internet technology and communication protocols have not been specifically designed to support IoT devices. The leakage of data security through the commercialization of IoT devices, causes privacy problems, threats of cyber-attacks, and organized crime. This paper aims to educate about how data security attacks in IoT and how to overcome them. To achieve this goal, we first discuss various well-known IoT reference models and define security in the context of IoT. Second, identify and classify various IoT attacks and threats. Third, described methods of countermeasures against IoT attacks. In the end, it provides some tips on securing IoT devices.
38

Yashaswini, J. "A Review on IoT Security Issues and Countermeasures." Oriental journal of computer science and technology 10, no. 2 (May 18, 2017): 454–59. http://dx.doi.org/10.13005/ojcst/10.02.28.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Internet of things (IoT) is a system of connected physical objects that are accessible through an internet. The things in IoT is an object that assigned with an IP address and have the ability to collect and transfer the data over a network without manual intervention. As IOT does not need any human to machine interaction, it seems to be one of the largest waves of revolution as per the research going on, hence security is needed. The quick development of IOT has derived with the challenges in terms of security of things. This paper focus on the general security issues in IoT and measures used to overcome with those security issues.
39

Radha, Mrs C., Mr M. Madheswaran, Mr M. Lokesh, and Mr M. Mohammad Althaf. "Environmental Monitoring in Internet of Things (IOT)." International Journal for Research in Applied Science and Engineering Technology 12, no. 4 (April 30, 2024): 1658–63. http://dx.doi.org/10.22214/ijraset.2024.60086.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Abstract: The Internet of Things (IoT) connects physical objects to the internet, enabling autonomous data collection and analysis. In environmental monitoring, IoT plays a crucial role in gathering real-time data on parameters like air and water quality, weather, wildlife behavior, and urban heat islands. This abstract explores how IoT is used in environmental monitoring, covering standards, device types, and applications. IoT comprises interconnected devices that collect environmental data and transmit it for analysis, facilitating continuous observation and better resource management. Standards like MQTT and communication technologies like Wi-Fi govern IoT implementation. Environmental monitoring involves assessing air and water quality, weather conditions, wildlife behavior, and urban heat islands. Air quality monitoring measures pollutant levels in the atmosphere using IoT-based sensor networks. Water quality monitoring assesses chemical and biological characteristics of water bodies. Weather and climate monitoring observe atmospheric conditions using IoT-based sensor networks. Wildlife monitoring tracks animal movements and behavior using IoT-enabled devices. Urban heat island monitoring assesses temperature distribution in urban areas using IoT-based sensors. IoT revolutionizes environmental monitoring by enabling real-time, remote observation across various domains, contributing to better resource management and sustainability efforts.
40

Katiyar, Ankit, and Pradeep Kumar. "A Review of Internet of Things (IoT) in Construction Industry: Building a Better Future." International Journal of Advanced Science Computing and Engineering 3, no. 2 (August 30, 2021): 65–72. http://dx.doi.org/10.62527/ijasce.3.2.53.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Construction companies today are aiming for the finest technologies to achieve their targets in minimum cost possible along with a high level of security and safety. Construction companies are focusing more on the benefits of internet in their projects in order to improve processes, reduce waste and optimally utilize their resources and Internet of Things (IoT) is making it possible in a much more efficient way than thought of. IoT has now become the newest of the technology that is being used in the construction industry. IoT is basically the network of physical objects—buildings, vehicles, devices and other objects fixed with sensors, software, electronics and internet connectivity which aids these objects to collect, store and exchange data. This paper aims to improve the understanding of the importance of IoT and its implementation in the construction industry. The paper presents the compiled study of the works done by various researchers in which IoT can be used in the construction industry. The findings of their work have been discussed in this paper and future scope of work regarding the usage of IoT in different fields have been identified.
41

Marinov, Val R. "Embedded Flexible Hybrid Electronics for the Internet of Things." International Symposium on Microelectronics 2015, no. 1 (October 1, 2015): 000006–13. http://dx.doi.org/10.4071/isom-2015-tp12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
The Internet of Things (IoT) “things” are often times described as active or smart devices and objects augmented with sensing, processing, and network capabilities. These smart objects are in the heart of the IoT concept but they alone cannot realize the full potential of IoT. The most ubiquitous objects in the IoT ecosystem, those that reside at the lowest system level and interact with the higher-level smart object, are based on the passive RFID technology. In the form of wireless passive sensors these objects are found in smart packaging, they form the backbone of the structural health monitoring systems, they provide non-invasive and continuous monitoring of physiological parameters, etc. RFID capability is already added to everyday items in the physical form of adhesive “smart” labels, enabling them to become “citizens” of the IoT ecosystem, but this “add-on“ approach increases the implementation cost and oftentimes impacts negatively the host item's form factor and appearance. It also does very little in terms of security and counterfeit prevention. On the other hand, the key economic factor that drives the deployment of the IoT is the cost at the end points. Therefore, the future of the IoT depends on developing an ultra-low-cost technology solution that can mass-produce low cost, RFID-enabled IoT objects on flexible substrates, ready for integration into everyday items. In some cases, such as in intelligent packaging, these objects will be non-obstructive and seamlessly integrated in their hosts. This integration will minimize the cost of implementation and will provide an insurmountable barrier to counterfeiters as they will need access to sophisticated and capital-intensive technologies in order to be able to alter or replicate the product's embedded configuration. Presented are two disruptive processes for packaging of ultrathin flexible hybrid electronic systems with ICs as thin as 15–20 μm and as small as 250 μm per side. The first generation technology is a modification of the conventional pick-and-place technique and has been already demonstrated on a commercial-grade roll-to-roll assembly line with packaging rates exceeding 10,000 cph. The second generation technology uses a laser beam to scan and transfer ultrathin, ultra-small ICs for high-precision assembly onto various flexible and rigid substrates. It provides packaging rates significantly exceeding those of the conventional pick-and-place equipment. Reported are also results from integrating the resulting ultrathin flexible hybrid electronic devices into thin materials such as paper and plastics.
42

Javida Damirova, Javida Damirova, and Laman Musayeva Laman Musayeva. "INTERNET OF THINGS." PAHTEI-Procedings of Azerbaijan High Technical Educational Institutions 13, no. 02 (March 1, 2022): 33–43. http://dx.doi.org/10.36962/pahtei13022022-33.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
This article will discuss the Internet of things, which is a completely new technology. Currently, the world's most talked about new electronics use Internet of Things technology. This technology includes Google, Yandex, YouTube and all our social networks. The current benefits of Internet of Things technology will be discussed, as well as its future position. What is the role of smart technologies in the development of robotics, new electronics and the impetus for new inventions? The Internet of Things is a new paradigm that transforms traditional lifestyles into high-tech lifestyles. Many important studies and researches have been conducted to improve the technology through IoT. The Internet of Things, or IoT, refers to the billions of physical devices around the world that are now connected to the internet, all collecting and sharing data. The main purpose of this review article is to provide a detailed discussion, both technologically and socially. It is not just about the connected devices but also about the hardware, software, connectivity and communication protocols, middleware and so much more to create Internet of Things solutions as mentioned. And it’s also about many processes and technologies. So, this is most important theme in our world. The article discusses various problems and key issues in IoT, architecture and important applications. The Internet of Things is an emerging paradigm that enables the communication between electronic devices and sensors through the internet in order to facilitate our lives. IoT has also demonstrated its importance and potential for economic and industrial growth in the developing region. It is also seen as a revolutionary step in the trading and stock markets. However, data and information security is an important concern and is highly desirable, which is a major challenge that needs to be addressed. The Internet, the biggest source of security threats and cyber attacks, has opened various doors for hackers, thereby discrediting information and data. IoT is committed to providing the best possible solutions to deal with data and information security issues. IoT's most important concern in trade and the economy is security. The IoT system consists of a large number of devices and sensors that communicate with each other. They can range from a Wi-Fi pet camera on your bookshelf to a medical device implanted in your body, like a pacemaker. As long as the device is able to connect to the internet and has sensors that transmit data, it can be considered an IoT device. As the IoT network grows and expands, the number of these sensors and devices is growing rapidly. These devices communicate with each other and transmit large amounts of information over the Internet. This information is very large and flows every second, and therefore deserves to be called great information. The IoT was initially most interesting to business and manufacturing, where its application is sometimes known as machine-to-machine (mean - M2M), but the emphasis is now on filling our homes and offices with smart devices, transforming it into something. Today, these IoT projects are evolving and rapidly spreading to all platforms. It is possible to find IoT projects for each topic. As mentioned earlier, IoT projects are designed to make life easier. These projects, created to help as many people as possible, will be the most important part of our future lives. It will be impossible to imagine our lives without the Internet of Things and smart projects. A smart city with sensors covering all its regions using diverse tangible gadgets and objects all over the community and connected with the help of internet. The continuous expansion of IoT-based networks poses complex challenges such as data management and collection, storage and processing, and analytics. This article sheds light on the existing literature and describes their contributions to various aspects of IoT. This article will help readers and researchers understand IoT and its application to the real world Keywords: arduino, sensors, security systems, robotics, intelligent technology.
43

Choudhary, Sarika, and Nishtha Kesswani. "A Survey." International Journal of Information Security and Privacy 13, no. 1 (January 2019): 86–105. http://dx.doi.org/10.4018/ijisp.2019010107.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
The latest buzzword in internet technology nowadays is the Internet of Things. The Internet of Things (IoT) is an ever-growing network which will transform real-world objects into smart or intelligent virtual objects. IoT is a heterogeneous network in which devices with different protocols can connect with each other in order to exchange information. These days, human life depends upon the smart things and their activities. Therefore, implementing protected communications in the IoT network is a challenge. Since the IoT network is secured with authentication and encryption, but not secured against cyber-attacks, an Intrusion Detection System is needed. This research article focuses on IoT introduction, architecture, technologies, attacks and IDS. The main objective of this article is to provide a general idea of the Internet of Things, various intrusion detection techniques, and security attacks associated with IoT.
44

Abid, Muhammad Aneeq, Naokhaiz Afaqui, Muazzam A. Khan, Muhammad Waseem Akhtar, Asad Waqar Malik, Arslan Munir, Jawad Ahmad, and Balawal Shabir. "Evolution towards Smart and Software-Defined Internet of Things." AI 3, no. 1 (February 21, 2022): 100–123. http://dx.doi.org/10.3390/ai3010007.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
The Internet of Things (IoT) is a mesh network of interconnected objects with unique identifiers that can transmit data and communicate with one another without the need for human intervention. The IoT has brought the future closer to us. It has opened up new and vast domains for connecting not only people, but also all kinds of simple objects and phenomena all around us. With billions of heterogeneous devices connected to the Internet, the network architecture must evolve to accommodate the expected increase in data generation while also improving the security and efficiency of connectivity. Traditional IoT architectures are primitive and incapable of extending functionality and productivity to the IoT infrastructure’s desired levels. Software-Defined Networking (SDN) and virtualization are two promising technologies for cost-effectively handling the scale and versatility required for IoT. In this paper, we discussed traditional IoT networks and the need for SDN and Network Function Virtualization (NFV), followed by an analysis of SDN and NFV solutions for implementing IoT in various ways.
45

Azrour, Mourade, Jamal Mabrouki, Azidine Guezzaz, and Ambrina Kanwal. "Internet of Things Security: Challenges and Key Issues." Security and Communication Networks 2021 (September 14, 2021): 1–11. http://dx.doi.org/10.1155/2021/5533843.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Internet of Things (IoT) refers to a vast network that provides an interconnection between various objects and intelligent devices. The three important components of IoT are sensing, processing, and transmission of data. Nowadays, the new IoT technology is used in many different sectors, including the domestic, healthcare, telecommunications, environment, industry, construction, water management, and energy. IoT technology, involving the usage of embedded devices, differs from computers, laptops, and mobile devices. Due to exchanging personal data generated by sensors and the possibility of combining both real and virtual worlds, security is becoming crucial for IoT systems. Furthermore, IoT requires lightweight encryption techniques. Therefore, the goal of this paper is to identify the security challenges and key issues that are likely to arise in the IoT environment in order to guide authentication techniques to achieve a secure IoT service.
46

Odame, Frederick Asumang. "Privacy Preserving Internet of Things (IoT) Forensics." Advances in Multidisciplinary and scientific Research Journal Publication 1, no. 1 (July 20, 2022): 109–12. http://dx.doi.org/10.22624/aims/crp-bk3-p18.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
The Internet of Things (IoT) envisions a network of pervasive, connected, and intelligent nodes that interact autonomously and provide a variety of services. IoT objects were a perfect target for cyber assaults because of their wide dispersion, openness, and relatively high processing power. Furthermore, because many IoT nodes collect and process personal or private data, they are becoming a goldmine of information for cybercriminals. As a result, security, particularly the ability to detect compromised nodes, as well as the collection and preservation of evidence of an attack or malicious activity, emerge as a top priority in the effective deployment of IoT networks. Key words: Information Security, IoT, Privacy Preserving, Cyber Security, Cyber Criminals
47

Upadhyay, Sachin. "ONGOING CHALLENGES AND RESEARCH OPPORTUNITIES IN INTERNET OF THINGS (IOT)." International Journal of Engineering Technologies and Management Research 5, no. 2 (May 2, 2020): 216–22. http://dx.doi.org/10.29121/ijetmr.v5.i2.2018.647.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
The Internet of Things (IoT) opens opportunities for handheld devices, home appliances, and software to share and communicate information on the Internet. Advances in the areas of embedded systems, computing, and networking are leading to an infrastructure composed of millions of heterogeneous devices. These devices will not simply convey information but process it in transit, connect peer to peer, and form advanced collaborations. This “Internet of Things (IoT)” infrastructure will be strongly integrated with the environment. This paper focuses on researching on the architecture and technology of Internet of Things. Moreover, the applications of Internet of Things are interpreted in this paper. We begin with general information security background of IoT and continue on with information security related challenges that IoT will encountered. Finally, we will also point out research directions that could be the future work for the solutions to the security challenges that IoT encounters. The future is Internet of Things, which will transform the real world objects into intelligent virtual objects.
48

Upadhyay, Sachin, and Seema Singh. "ONGOING CHALLENGES AND RESEARCH OPPORTUNITIES IN INTERNET OF THINGS (IOT)." International Journal of Computer Science and Mobile Computing 11, no. 12 (December 30, 2022): 61–64. http://dx.doi.org/10.47760/ijcsmc.2022.v11i12.006.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
The Internet of Things (IoT) opens opportunities for wearable devices, home appliances, and software to share and communicate information on the Internet. Advances in the areas of embedded systems, computing, and networking are leading to an infrastructure composed of millions of heterogeneous devices. These devices will not simply convey information but process it in transit, connect peer to peer, and form advanced collaborations. This “Internet of Things (IoT)” infrastructure will be strongly integrated with the environment. This paper focuses on researching on the architecture and technology of Internet of Things. Moreover, the applications of Internet of Things are interpreted in this paper.We begin with general information security background of IoT and continue on with information security related challenges that IoT will encountered. Finally, we will also point out research directions that could be the future work for the solutions to the security challenges that IoT encounters. The future is Internet of Things, which will transform the real-world objects into intelligent virtual objects.
49

Cgseong, Chang-Gyu, Jung-Yee Kim, and Doo-Jin Park. "Real-time object control system using open source platform." Indonesian Journal of Electrical Engineering and Computer Science 20, no. 1 (October 1, 2020): 313. http://dx.doi.org/10.11591/ijeecs.v20.i1.pp313-319.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
<p>Recently, the Internet of things(IoT) has received great attention, and the demand for IOT applications in various fields is increasing. But drawbacks of IoT, such as having to use dedicated equipment and having to pay for a flat fee monthly, do not satisfy the consumers’ demands. These shortcomings of IoT is causing the appearance of users who try to design the environment of IoT that responds their demands and naturally, attempts to have monitoring system through open-source hardware like Arduino. Open source hardware has attracted a great deal of attention for the diffusion of the Internet of things as a key element of the Internet construction. The emergence of open source hardware, which has the advantage of low cost and easy and fast development, has made it possible to embody the idea of object Internet application services. In this paper, we design and implement a system that controls the objects in real time using open source hardware and MQTT protocol.</p>
50

Chehal, Naman, and Karandeep Singh. "Security & Privacy Challenges in IOT Based Smart Homes." International Journal of Engineering Research in Computer Science and Engineering 9, no. 3 (March 30, 2022): 13–18. http://dx.doi.org/10.36647/ijercse/09.03.art003.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
The Internet of Things (IoT) is a collection of Internet-connected networks, objects, and gadgets. Internally and outwardly, it interacts with the surroundings. The Internet of Things (IoT) detects and reacts to its surroundings. It provides modern approaches to the environment, hence improving mankind's quality of life. IoT enables devices to communicate with one another either in person or online. The Internet of Things (IoT) allows the environment to become smarter and connect with any device at any one time. People nowadays desire to use the Internet to converse with all non-living entities. The Internet of Things (IoT) is used to collect and analyse data from numerous actuators and sensors and then it is analysed before being sent wirelessly to cellphones or computers connection

To the bibliography