To see the other types of publications on this topic, follow the link: IoT Internet des objets.

Journal articles on the topic 'IoT Internet des objets'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'IoT Internet des objets.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Milivojević, Sanja, and Elizabeth Radulski. "The 'Future Internet' and crime: Towards a criminology of the Internet of Things." Crimen 11, no. 3 (2020): 255–71. http://dx.doi.org/10.5937/crimen2003255m.

Full text
Abstract:
The Internet of Things (IoT) is poised to revolutionise the way we live and communicate, and the manner in which we engage with our social and natural world. In the IoT, objects such as household items, vending machines and cars have the ability to sense and share data with other things, via wireless, Bluetooth, or Radio Frequency IDentification (RFID) technology. "Smart things" have the capability to control their performance, as well as our experiences and decisions. In this exploratory paper, we overview recent developments in the IoT technology, and their relevance for criminology. Our aim is to partially fill the gap in the literature, by flagging emerging issues criminologists and social scientists ought to engage with in the future. The focus is exclusively on the IoT while other advances, such as facial recognition technology, are only lightly touched upon. This paper, thus, serves as a starting point in the conversation, as we invite scholars to join us in forecasting-if not preventing-the unwanted consequences of the "future Internet".
APA, Harvard, Vancouver, ISO, and other styles
2

C. Sailaja. "Industrial Internet of Things – An Overview." December 2022 4, no. 4 (2022): 257–71. http://dx.doi.org/10.36548/jismac.2022.4.003.

Full text
Abstract:
Internet of Things (IoT) is a network of intelligent objects (smart sensors) that are connected and accessible to the Internet through devices such as routers to exchange data. Many useful applications can be developed using IoT. IoT has brought a change in such a way that everything around us can be turned into smart devices e.g., smart cars, smart homes, smart parking, smart cities etc., thereby connecting human, machine & things seamlessly. The advent of cheaper processing power, communication cost and some marketing have created the IoT of today. When the principles of IoT are applied to Industries, it is termed as Industrial IoT. Smart sensors and Industrial Internet of Things (IIoT) are modern tools which drive Industry 4.0. The use of smart sensors and IIoT have a positive impact in enhancing the quality & value of products and improve efficiency. The combination of smart sensors with its processing & networking capabilities help in transferring the process data to the centralized database for further analysis. Thus, digitalization has helped industry to reimage the business with the transformation brought about by IIoT. This paper discusses some of the applications of IIoT such as Remote Monitoring & Service, AI & ML based predictive analysis and Closed loop Digital twin using IoT sensors.
APA, Harvard, Vancouver, ISO, and other styles
3

Taoufik, Ben Hassine. "Internet of Intelligent Things (IoIT)." World Journal of Advanced Research and Reviews 22, no. 3 (2024): 1062–66. https://doi.org/10.5281/zenodo.14741256.

Full text
Abstract:
Internet of Intelligent Things (IoIT) is a combination and integration of Internet of Things (IoT) and Artificial Intelligence (AI). The first brings the physical world into the digital world and the second takes advantage of this fact to bring intelligence to form an artificially intelligent physical world. This paper attempts to humanize the physical objects of the IoT so that they become conscious, committed to collective objectives and educable like humans. This is possible and achievable thanks to the grandiose contribution of Artificial Intelligence. A specialized Transportation variant of the IoT is cited as a practical example of this marriage between IoT and AI. This practical example is the Internet of Vehicles (IoV) which concerns the field of land and air transport. This air transport takes advantage of Artificial Intelligence to make life easier for aerial objects and their human users.
APA, Harvard, Vancouver, ISO, and other styles
4

Suryani, Vera, Selo Sulistyo, and Widyawan Widyawan. "Trust-Based Privacy for Internet of Things." International Journal of Electrical and Computer Engineering (IJECE) 6, no. 5 (2016): 2396. http://dx.doi.org/10.11591/ijece.v6i5.9678.

Full text
Abstract:
<p>Internet of Things or widely known as IOT makes smart objects become active participants in the communication process between objects and their environment. IoT services that utilize Internet connection require solutions to a new problem: security and privacy. Smart objects and machine-to-machine communications in IOT now become interesting research, including that related to security. Privacy, which is a safe condition in which object is free from interference from other objects, is one of the important aspects in IOT. Privacy can be implemented using various ways for examples by applying encryption algorithms, restrictions on access to data or users, as well as implementing rules or specific policy. Trustable object selection is one technique to improve privacy. The process of selecting a trustable object can be done based on past activities or trust history of the object, also by applying a threshold value to determine whether an object is "trusted" or not. Some researchers have studied this approach. In this study, the selection processes of trustable objects are calculated using Modified Ant Colony algorithm. The simulation was performed and resulted in declining graphic trend but stabilized in certain trust value.</p>
APA, Harvard, Vancouver, ISO, and other styles
5

Suryani, Vera, Selo Sulistyo, and Widyawan Widyawan. "Trust-Based Privacy for Internet of Things." International Journal of Electrical and Computer Engineering (IJECE) 6, no. 5 (2016): 2396. http://dx.doi.org/10.11591/ijece.v6i5.pp2396-2402.

Full text
Abstract:
<p>Internet of Things or widely known as IOT makes smart objects become active participants in the communication process between objects and their environment. IoT services that utilize Internet connection require solutions to a new problem: security and privacy. Smart objects and machine-to-machine communications in IOT now become interesting research, including that related to security. Privacy, which is a safe condition in which object is free from interference from other objects, is one of the important aspects in IOT. Privacy can be implemented using various ways for examples by applying encryption algorithms, restrictions on access to data or users, as well as implementing rules or specific policy. Trustable object selection is one technique to improve privacy. The process of selecting a trustable object can be done based on past activities or trust history of the object, also by applying a threshold value to determine whether an object is "trusted" or not. Some researchers have studied this approach. In this study, the selection processes of trustable objects are calculated using Modified Ant Colony algorithm. The simulation was performed and resulted in declining graphic trend but stabilized in certain trust value.</p>
APA, Harvard, Vancouver, ISO, and other styles
6

Park, Jong. "Advances in Future Internet and the Industrial Internet of Things." Symmetry 11, no. 2 (2019): 244. http://dx.doi.org/10.3390/sym11020244.

Full text
Abstract:
After the emergence of the Internet and mobile communication networks, the IoT has been considered as the third wave of information technology. The Industrial Internet of Things (IIoT) is the use of Internet of Things (IoT) technologies in manufacturing. IIoT incorporates machine learning and big data technology, sensor data, and machine-to-machine (M2M) communications that have existed in industrial areas for years. In the future, people and objects will be connected at any time, any place, with anything and anyone and will utilize any network and services. IIoT is creating a new world in which people and businesses can manage their assets in more informed ways and can make more opportune and better-informed decisions. Many advanced IIoT and 5G technologies have been successfully applied in everyday life, but there are still many practical problems tackled by traditional methods which are generally difficult to experimentally solve in the advanced Industrial Internet of Things. Therefore, in this special issue, we accepted five articles in three different dimensions: communication networks, optimized resource provisioning and data forwarding, privacy and security.
APA, Harvard, Vancouver, ISO, and other styles
7

Raimundo, Ricardo Jorge, and Albérico Travassos Rosário. "Cybersecurity in the Internet of Things in Industrial Management." Applied Sciences 12, no. 3 (2022): 1598. http://dx.doi.org/10.3390/app12031598.

Full text
Abstract:
Nowadays, people live amidst the smart home domain, while there are business opportunities in industrial smart cities and healthcare. However, there are concerns about security. Security is central for IoT systems to protect sensitive data and infrastructure, whilst security issues have become increasingly expensive, in particular in Industrial Internet of Things (IIoT) domains. Nonetheless, there are some key challenges for dealing with those security issues in IoT domains: Applications operate in distributed environments such as Blockchain, varied smart objects are used, and sensors are limited, as far as machine resources are concerned. In this way, traditional security does not fit in IoT systems. The issue of cybersecurity has become paramount to the Internet of Things (IoT) and the Industrial Internet of Things (IIoT) in mitigating cybersecurity risk for organizations and end users. New cybersecurity technologies/applications present improvements for IoT security management. Nevertheless, there is a gap in the effectiveness of IoT cyber risk solutions. This review article discusses the literature trends around opportunities and threats in cybersecurity for IIoT, by reviewing 70 key articles discovered from a profound Scopus literature survey. It aims to present the current debate around the issue of IIoT rather than suggesting any particular technical solutions to solve network security problems.
APA, Harvard, Vancouver, ISO, and other styles
8

Birje, Mahantesh N., Arun A. Kumbi, and Ashok V. Sutagundar. "Internet of Things." International Journal of Hyperconnectivity and the Internet of Things 1, no. 2 (2017): 45–71. http://dx.doi.org/10.4018/ijhiot.2017070104.

Full text
Abstract:
This article describes how the Internet of Things (IoT) enables interaction and integration of real world things or objects—such as cars, electronic devices, homes, etc.—using various inter-operable communication protocols. This leads to a digital society of billions of devices that can sense, process, share, track, shop, chat and work in cooperative manner. There exist many challenges in the realization of IoT based distributed systems. This article intends to introduce various aspects of IoT such as views/visions, Architecture and protocols of IoT, communication technology, general requirements and various application domains. This article intends to disseminate the state-of-the-art multi-fold information on IoT to researchers, academicians, and student community.
APA, Harvard, Vancouver, ISO, and other styles
9

Susanto, Fredy, Ni Komang Prasiani, and Putu Darmawan. "IMPLEMENTASI INTERNET OF THINGS DALAM KEHIDUPAN SEHARI-HARI." Jurnal Imagine 2, no. 1 (2022): 35–40. http://dx.doi.org/10.35886/imagine.v2i1.329.

Full text
Abstract:
ABSTRACT
 Internet of Things or abbreviated as IoT is a technology that innovates surrounding objects with the internet so that daily activities become easier and more efficient. The Internet of Things is a technology that allows objects around us to be connected to the Internet. The importance of the Internet of Things can be seen with the increasing number of applications in various lines of life today. IoT gives us many ideas to participate in various aspects of development ranging from micro to macro around the world. The internet of things has made it a separate field of research since the development of internet technology (IT) and other communication media. The methodology used in the development of IoT is of various kinds. From the real time system to the use of the prototype flow. The more human needs about technology are developing, the more research will be present, the internet of things is one of the thoughts of researchers who optimize several tools such as sensor media, Radio Frequency Identification (RFID), Wireless Sensor Networks and other Smart Objects that allow humans easy to interact with all equipment connected to the internet network.
 Keywords: IoT, RFID, Wireless Sensor Network, Smart Object
 ABSTRAK
 Internet of Things atau disingkat dengan istilah IoT merupakan teknologi yang menginovasi benda-benda sekitar dengan internet agar aktivitas sehari-hari menjadi lebih mudah dan efisien. Internet of Things adalah teknologi yang memungkinkan benda-benda di sekitar kita terhubung dengan Internet. Pentingnya Internet of Things dapat dilihat dengan semakin banyaknya diterapkan dalam berbagai lini kehidupan saat ini. IoT memberikan kita banyak gagasan untuk turut berperan serta dalam berbagai segi perkembangan mulai dari hal mikro hingga makro di seluruh dunia. Internet of things menjadikannya sebuah bidang penelitian tersendiri sejak berkembangnya teknologi internet (IT) dan media komunikasi lain. Metodology yang yang digunakan dalam pengembangan IoT ini adalah berbagai macam. Dari yang real time system hingga penggunaan alur prototype. Semakin berkembang keperluan manusia tentang teknologi, maka semakin banyak penelitian yang akan hadir, internet of things adalah salah satu hasil pemikiran para peneliti yang mengoptimasi beberapa alat seperti media sensor, Radio Frequency Identification (RFID), Wireless Sensor Network serta Smart Object lain yang memungkinkan manusia mudah berinteraksi dengan semua peralatan yang terhubung dengan jaringan internet.
 
 Kata kunci : IoT, RFID, Wireless Sensor Network, Smart Object
APA, Harvard, Vancouver, ISO, and other styles
10

E, Umamaheswari, and Ajay Dm. "SCOPE OF INTERNET OF THINGS: A SURVEY." Asian Journal of Pharmaceutical and Clinical Research 10, no. 13 (2017): 187. http://dx.doi.org/10.22159/ajpcr.2017.v10s1.19633.

Full text
Abstract:
The advent of internet of things (IoT) has influenced and revolutionized the information systems and computing technologies. A computing conceptwhere physical objects used in daily life, will identify themselves by getting connected to the internet is called IoT. Physical objects embedded withelectronic, software, radio-frequency identification, sensors, actuators and smart objects converge with the internet to accumulate and share datain IoT. IoT is expected to bring in drastic changes and solutions to most of the daily problems in the real world. This paper explains in detail the keyconcepts of IoT, the applications of IoT, the challenges in establishing IoT. This work also explains in detail the future scope of IoT in different fields.
APA, Harvard, Vancouver, ISO, and other styles
11

Phupattanasilp, Pilaiwan, and Sheau-Ru Tong. "Augmented Reality in the Integrative Internet of Things (AR-IoT): Application for Precision Farming." Sustainability 11, no. 9 (2019): 2658. http://dx.doi.org/10.3390/su11092658.

Full text
Abstract:
Benefitted by the Internet of Things (IoT), visualization capabilities facilitate the improvement of precision farming, especially in dynamic indoor planting. However, conventional IoT data visualization is usually carried out in offsite and textual environments, i.e., text and number, which do not promote a user’s sensorial perception and interaction. This paper introduces the use of augmented reality (AR) as a support to IoT data visualization, called AR-IoT. The AR-IoT system superimposes IoT data directly onto real-world objects and enhances object interaction. As a case study, this system is applied to crop monitoring. Multi-camera, a non-destructive and low-cost imaging platform of the IoT, is connected to the internet and integrated into the system to measure the three-dimensional (3D) coordinates of objects. The relationships among accuracy, object coordinates, augmented information (e.g., virtual objects), and object interaction are investigated. The proposed system shows a great potential to integrate IoT data with AR resolution, which will effectively contribute to updating precision agricultural techniques in an environmentally sustainable manner.
APA, Harvard, Vancouver, ISO, and other styles
12

Long, Rong, Xiaohui Fan, Kai Wei, Junxuan Bai, and Shanpeng Xiao. "Internet-of-Things object model." Digital Twin 2 (April 12, 2022): 5. http://dx.doi.org/10.12688/digitaltwin.17562.1.

Full text
Abstract:
Background: With the advancement of communication technology and advanced sensors, there are massive demands for Internet-of-Things (IoT) applications in buildings, communities, factories, parks, etc. Accessing IoT devices provides convenience for scene management and monitoring, ameliorating production and life intelligently. However, due to the lack of a unified model for IoT devices, data is often skipped over IoT platforms and transmitted to applications directly. This leads to the fact that each manufacturer needs to produce its devices and develop its customized software, which hugely increases the development cycle. On the other hand, it is difficult to convey information between different systems, limiting cross- system control. Moreover, digital twin relies on large amounts of heterogeneous data, and it is impracticable to provide enough data without a unified model for device description. Methods: First, we illustrate the motivation, design goals, and design principles for creating the Internet-of-Things Object Model (IoT-OM). Then we propose a unified description to define IoT devices. The proposed concept has been accepted by several companies, and we analyse one platform that adopts the model. To demonstrate the effectiveness of the model, we introduce two projects based on the platform. One project is an intelligent fire protection system, and another project is an intelligent air quality monitoring system. Results: We measured the time taken by five companies when developing IoT devices and their applications, including the development cycle duration without utilizing the proposed model and the duration using the model at China Mobile’s OneNET platform. The results prove that the proposed model can significantly shorten the development cycle. Conclusions: This paper proposes a model for IoT devices, which helps to unify heterogeneous data among different manufacturers and helps to shorten the development cycles for developers.
APA, Harvard, Vancouver, ISO, and other styles
13

Jin, Wang *. Yi bin Hou. "INVESTIGATION ON THE INTERNET OF THINGS." INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY 5, no. 12 (2016): 861–79. https://doi.org/10.5281/zenodo.221118.

Full text
Abstract:
Do IOT problem definition and research. Research on Internet of things, first research object, Re research alliance,Re study network. Objects are things in the Internet of things, Link is how objects connect to the network, Network is what this network is. Objective function is the key problem. Can start with simple and critical questions. Algorithm is the solution to the problem steps. What is the Internet of things, objects connected to the Internet is the Internet of things, cup networking, car networking. Things better than other networks, is composed of what objects, what composition, what nature, what innovation and superiority. Internet of things four key technologies are widely used, these four technologies are mainly RFID, WSN, M2M, as well as the integration of the two. RFID can be achieved using MATLAB, NS2, Android, WSN can use NS2, OMNET++ implementation, M2M can be developed using JAVA. Therefore, this paper focuses on the advantages of Internet of things than the internet.
APA, Harvard, Vancouver, ISO, and other styles
14

Elhaloui, Loubna, Sanaa El Filali, El Habib Benlahmer, Mohamed Tabaa, Youness Tace, and Nouha Rida. "Machine learning for internet of things classification using network traffic parameters." International Journal of Electrical and Computer Engineering (IJECE) 13, no. 3 (2023): 3449. http://dx.doi.org/10.11591/ijece.v13i3.pp3449-3463.

Full text
Abstract:
With the growth of the internet of things (IoT) smart objects, managing these objects becomes a very important challenge, to know the total number of interconnected objects on a heterogeneous network, and if they are functioning correctly; the use of IoT objects can have advantages in terms of comfort, efficiency, and cost. In this context, the identification of IoT objects is the first step to help owners manage them and ensure the security of their IoT environments such as smart homes, smart buildings, or smart cities. In this paper, to meet the need for IoT object identification, we have deployed an intelligent environment to collect all network traffic traces based on a diverse list of IoT in real-time conditions. In the exploratory phase of this traffic, we have developed learning models capable of identifying and classifying connected IoT objects in our environment. We have applied the six supervised machine learning algorithms: support vector machine, decision tree (DT), random forest (RF), k-nearest neighbors, naive Bayes, and stochastic gradient descent classifier. Finally, the experimental results indicate that the DT and RF models proved to be the most effective and demonstrate an accuracy of 97.72% on the analysis of network traffic data and more particularly information contained in network protocols. Most IoT objects are identified and classified with an accuracy of 99.21%.
APA, Harvard, Vancouver, ISO, and other styles
15

Loubna, Elhaloui, El Filali Sanaa, Habib Benlahmer El, Tabaa Mohamed, Tace Youness, and Rida Nouha. "Machine learning for internet of things classification using network traffic parameters." International Journal of Electrical and Computer Engineering (IJECE) 13, no. 3 (2023): 3449–63. https://doi.org/10.11591/ijece.v13i3.pp3449-3463.

Full text
Abstract:
With the growth of the internet of things (IoT) smart objects, managing these objects becomes a very important challenge, to know the total number of interconnected objects on a heterogeneous network, and if they are functioning correctly; the use of IoT objects can have advantages in terms of comfort, efficiency, and cost. In this context, the identification of IoT objects is the first step to help owners manage them and ensure the security of their IoT environments such as smart homes, smart buildings, or smart cities. In this paper, to meet the need for IoT object identification, we have deployed an intelligent environment to collect all network traffic traces based on a diverse list of IoT in real-time conditions. In the exploratory phase of this traffic, we have developed learning models capable of identifying and classifying connected IoT objects in our environment. We have applied the six supervised machine learning algorithms: support vector machine, decision tree (DT), random forest (RF), k-nearest neighbors, naive Bayes, and stochastic gradient descent classifier. Finally, the experimental results indicate that the DT and RF models proved to be the most effective and demonstrate an accuracy of 97.72% on the analysis of network traffic data and more particularly information contained in network protocols. Most IoT objects are identified and classified with an accuracy of 99.21%.
APA, Harvard, Vancouver, ISO, and other styles
16

Yukari Kikuchi, Alissa, Lucas Antonio Betteri, and Liriane Soares Araújo. "IOT – INTERNET DAS COISAS." Revista Interface Tecnológica 18, no. 2 (2022): 118–30. http://dx.doi.org/10.31510/infa.v18i2.1211.

Full text
Abstract:
A corrida para novos avanços tecnológicos está cada vez mais intenso, a fim de atender a demanda que tem se habituado entre as pessoas em realizar tarefas de forma progressivamente acelerada. Com este rumo que a sociedade propende em obter cada vez mais praticidade, eficiência e economia de tempo, gera a relevância em explorar sobre a definição da Internet das Coisas (IoT) e seus recursos e funcionamento. Desta forma, este artigo consiste em investigar e situar sobre a IoT, bem como apresentar seu conceito, evolução, benefícios e impactos, com a finalidade de compreender o contexto, objetos e áreas de aplicação e analisar até em que ponto esta tecnologia é aplicável, ampliando de um modo geral o conhecimento sobre a Internet das Coisas
APA, Harvard, Vancouver, ISO, and other styles
17

Afrozah Nadeem. "Application of Internet of Things for Smart City and Environmental Solutions." Lahore Garrison University Research Journal of Computer Science and Information Technology 4, no. 2 (2020): 105–16. http://dx.doi.org/10.54692/lgurjcsit.2020.0402137.

Full text
Abstract:
Internet of Things (IoT) is the latest concept and considered the essential infrastructure for smart cities. However, IoT is allowing smart cities to take the initiative of starting different projects and its deployment all over the world. For Information & Communication Technologies (ICT) solutions, IoT is a compatible way to combine the numerous sensors. Communication of the Internet of Things is the soul of the smart cities. The scopeof IoT in smart cities is connected and deployed with over 50 billion objects this year and more in the future too. This paper deals with concern regarding IoT globally and a detailed review of the idea of IoT with the smart city encouragement and its applications. Furthermore, the paper presents the main gap, instability, and challenges of implementing the IoT with smart cities on technological standards.
APA, Harvard, Vancouver, ISO, and other styles
18

Dinh, Ngoc-Thanh, and Young-Han Kim. "An Efficient Correlation-Based Cache Retrieval Scheme at the Edge for Internet of Things." Sensors 20, no. 23 (2020): 6846. http://dx.doi.org/10.3390/s20236846.

Full text
Abstract:
Existing caching mechanisms considers content objects individually without considering the semantic correlation among content objects. We argue that this approach can be inefficient in Internet of Things due to the highly redundant nature of IoT device deployments and the data accuracy tolerance of IoT applications. In many IoT applications, an approximate answer is acceptable. Therefore, a cache of an information object having a high semantic correlation with the requested information object can be used instead of a cache of the exact requested information object. In this case, caching both of the information objects can be inefficient and redundant. This paper proposes a caching retrieval scheme which considers the semantic information correlation of information objects of nodes for cache retrieval. We illustrate the benefits of considering the semantic information correlation in caching by studying IoT data caching at the edge. Our experiments and analysis show that semantic correlated caching can significantly improve the efficiency, cache hit, and reduce the resource consumption of IoT devices.
APA, Harvard, Vancouver, ISO, and other styles
19

Benmammar, Badr. "Internet of Things and Cognitive Radio." International Journal of Organizational and Collective Intelligence 11, no. 1 (2021): 39–52. http://dx.doi.org/10.4018/ijoci.2021010103.

Full text
Abstract:
Internet of things (IoT) is a worldwide network of interconnected objects. However, the things-oriented, internet-oriented, semantic-oriented, and tactile-oriented versions of IoT are meaningless if the IoT objects are not equipped with intelligence. For this, current research trends are oriented towards cognitive radio. This paper presents IoT, its definition, its potential applications, its challenges, as well as its enabling technologies. Among these technologies, particular importance is given to cognitive radio. The overall objective of this paper is to make a global synthesis on the motivations as well as on the challenges to be raised by the integration of cognitive radio in IoT in order to serve as self-reconfigurable solutions for a certain number of IoT applications.
APA, Harvard, Vancouver, ISO, and other styles
20

Naderlou, Lida, Nigar Ismayilova, and Azar Feyziyev. "A REVIEW SIOT (SOCIAL INTERNET OF THINGS): TECHNIQUES, APPLICATIONS, CHALLENGES AND TRENDS." Azerbaijan Journal of High Performance Computing 5, no. 2 (2022): 236–53. http://dx.doi.org/10.32010/26166127.2022.5.2.236.253.

Full text
Abstract:
The social or human actions in the IoT platform derive the new paradigm in the IoT environment called the Social Internet of Things (SIoT). The Social Internet of Things is that part of an IoT capable of establishing social relationships with other objects concerning humans. SIoT attempts to moderate IoT challenges in scalability, trust, and resource discovery by taking a cue from social computing. In the IoT family, there is a subset of SIoT, a relatively recent concept. Moreover, a method of integrating IoT with social networking. SIoT is a simulation of human-to-human and object-to-object social networks where Humans are called intellectual and relational objects. They build their social network to accomplish shared objectives such as enhancing accessibility, success, and productivity and providing their needed services. This paper has extensively surveyed the SIoT (social Internet of things) for beginners involved in SIoT Studies. This paper gives you a clear view and ideas about SIoT's architecture, relationships, trust management, and applications and challenges implemented related to SIoT.
APA, Harvard, Vancouver, ISO, and other styles
21

Singh, Om Prakash, Ranjith Ranjith C. S, Karthik R., Sandeep Reddy, and Rashmi Soni. "Survey Report on Sending Data Securely using IOT Over Cloud." International Journal of Recent Technology and Applied Science 2, no. 1 (2020): 75–80. http://dx.doi.org/10.36079/lamintang.ijortas-0201.76.

Full text
Abstract:
Survey Report on Sending Data Securely using IOT Over Cloud
 The Internet of Things (IOT) is the network of physical objects, computers, cars, houses, and other things embedded with electronics, software, sensors, and network connectivity, allowing these objects to collect and exchange data. In the new technology market, IOT innovations is the next major step, but with the big difference that it brings about massive changes in business usability. A flare in the number of connected devices as well as placed locations is anticipated over the next few years and the functions that they will perform. Due to recent developments in networking and sensor technology, the Internet of Things (IoT) has grown rapidly. It seems very difficult to link that object together through the internet, but within a time frame, the internet of things will change our lives dramatically.
APA, Harvard, Vancouver, ISO, and other styles
22

Anureet, Kaur. "INTERNET of THINGS (IoT):SECURITY AND PRIVACY CONCERNS." INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY 5, no. 5 (2016): 161–65. https://doi.org/10.5281/zenodo.51013.

Full text
Abstract:
The Internet of Things(IoT) is a vision in which Internet outspreads into the real world espousal of daily objects. The objects no longer seems separated from the virtual world and  can be controlled distantly. The term “Internet of Things” is devised from the two words “Internet”  and “Things”. The Internet is an interconnected computer networks that use the standard Internet. The word “Things” can be any object or person in real world  from any electronic equipment to any non- electronic as well.The Internet of Things (IoT) represents the interconnection of several equipments such as smart devices and services. Presently, more than a billions of  devices are connected to Internet, including PCs, embedded sensors, and mobile phones.This paper gives an overview, Architecture ,Application areas, security and privacy challenges in the Internet of Things.
APA, Harvard, Vancouver, ISO, and other styles
23

Dr., P. Calduwel Newton, and Thomas Felix A. "Internet of Things Technologies and Issues: A Survey." nternational Journal of Information Technology, Research and Applications (IJITRA) 1, no. 1 (2022): 12–18. https://doi.org/10.5281/zenodo.6625739.

Full text
Abstract:
<strong>Abstract</strong> Internet of Things (IoT) was at the outset called as Internet of Everything (IoE). Objects in the IoT are assigned unique IDs. They have the ability to transmit data over a network of physical and virtual objects without the need for human-to-human or system-to-system communication. Devices linked to the internet may talk to one other and other internet-connected gadgets using this technology. IoT is also described as Web-connected objects orThings. IoT Systems middleware can be defined as a software intermediary betweenIoT devices and applications. IoT intends to unite everything under a common infrastructure within the world. The main purpose of this article is to make an IoT survey, sorts of architectures, therefore the technologies utilized in our lifestyle, and smart environment. Furthermore, this study serves as a solid starting point for future IoT research.
APA, Harvard, Vancouver, ISO, and other styles
24

Spyros, G. Tzafestas. "The Internet of Things: A Conceptual Guided Tour." European Journal of Advances in Engineering and Technology 5, no. 10 (2018): 745–67. https://doi.org/10.5281/zenodo.10726054.

Full text
Abstract:
<strong>ABSTRACT</strong> The Internet of Things (IoT) is an enhancement of the Internet that can be described as things/objects in our environment being connected anytime and anywhere with anything and anyone, over the Internet, so as to give seamless communications and external services. Thus, IoT is a web of a tremendous number of connections of &lsquo;things with things&rsquo;, and &lsquo;humans with things&rsquo;, which is naturally more dynamic and more complex than the internet itself. The purpose of this article is to provide a summarized conceptual tour to IoT that covers ontological issues, characteristics, advantages and disadvantages, architectures and platforms, hardware and software components, and examples of typical applications.
APA, Harvard, Vancouver, ISO, and other styles
25

Jumaa, Noor. "Survey: Internet of Thing Using FPGA." Iraqi Journal for Electrical and Electronic Engineering 13, no. 1 (2017): 38–45. http://dx.doi.org/10.37917/ijeee.13.1.5.

Full text
Abstract:
Everything in its way to be computerized and most of the objects are coming to be smart in present days. Modern Internet of Thing (IoT) allows these objects to be on the network by using IoT platforms. IoT is a smart information society that consists of smart devices; these devices can communicate with each other without human's intervention. IoT systems require flexible platforms. Through the use of Field Programmable Gate Array (FPGA), IoT devices can interface with the outside world easily with low power consumption, low latency, and best determinism. FPGAs provide System on Chip (SoC) technique due to FPGAs scalability which enables the designer to implement and integrate large number of hardware clocks at single chip. FPGA can be deemed as a special purpose reprogrammable processor since it can process signals at its input pins, manipulate them, and give off signals on the output pins. In this paper, using FPGA for IoT is the limelight.
APA, Harvard, Vancouver, ISO, and other styles
26

Jumaa, Noor. "Survey: Internet of Thing Using FPGA." Iraqi Journal for Electrical and Electronic Engineering 13, no. 1 (2017): 38–45. http://dx.doi.org/10.37917/ijeee.13.5.

Full text
Abstract:
Everything in its way to be computerized and most of the objects are coming to be smart in present days. Modern Internet of Thing (IoT) allows these objects to be on the network by using IoT platforms. IoT is a smart information society that consists of smart devices; these devices can communicate with each other without human's intervention. IoT systems require flexible platforms. Through the use of Field Programmable Gate Array (FPGA), IoT devices can interface with the outside world easily with low power consumption, low latency, and best determinism. FPGAs provide System on Chip (SoC) technique due to FPGAs scalability which enables the designer to implement and integrate large number of hardware clocks at single chip. FPGA can be deemed as a special purpose reprogrammable processor since it can process signals at its input pins, manipulate them, and give off signals on the output pins. In this paper, using FPGA for IoT is the limelight.
APA, Harvard, Vancouver, ISO, and other styles
27

Ramu, Sridarala, and Daniel Osaku. "New Approach Securing the Internet of Things." International Journal of Information Technology and Applied Sciences (IJITAS) 2, no. 1 (2020): 7–13. http://dx.doi.org/10.52502/ijitas.v2i1.8.

Full text
Abstract:
IOT connected objects are new technologies used to connect objects to the internet and to users. The IOT influences our daily life in several fields such as logistics, health, energy, intelligent vehicles, the smart home or the smart city ... Subsequently, following the specific characteristics of the different areas of use, a multitude IOT applications have been developed and deployed using different IOT frameworks. An IOT framework is a set of rules, protocols and standards that simplify the implementation of IOT applications. The proper functioning and success of these applications depends on the characteristics of the framework, and also on the security mechanisms used. In this article, we will discuss the frameworks used by presenting the proposed architecture of each framework, the compatible hardwares and softwares and the security mechanisms used, then a comparative study of these frameworks will be presented. Finally, we will propose an architecture of a secure IOT framework.
APA, Harvard, Vancouver, ISO, and other styles
28

Sridarala, ramu, and Osaku Daniel. "New Approach Securing the Internet of Things." International Journal of Information Technology and Applied Sciences (IJITAS) 2, no. 1 (2020): 7–13. https://doi.org/10.52502/ijitas.v2i1.8.

Full text
Abstract:
IOT connected objects are new technologies used to connect objects to the internet and to users. The IOT influences our daily life in several fields such as logistics, health, energy, intelligent vehicles, the smart home or the smart city ... Subsequently, following the specific characteristics of the different areas of use, a multitude IOT applications have been developed and deployed using different IOT frameworks. An IOT framework is a set of rules, protocols and standards that simplify the implementation of IOT applications. The proper functioning and success of these applications depends on the characteristics of the framework, and also on the security mechanisms used. In this article, we will discuss the frameworks used by presenting the proposed architecture of each framework, the compatible hardwares and softwares and the security mechanisms used, then a comparative study of these frameworks will be presented. Finally, we will propose an architecture of a secure IOT framework.
APA, Harvard, Vancouver, ISO, and other styles
29

Salukhe, Adarsh. "Internet of Things." International Journal for Research in Applied Science and Engineering Technology 11, no. 9 (2023): 1062–69. http://dx.doi.org/10.22214/ijraset.2023.55710.

Full text
Abstract:
Abstract: The Internet of Things (IoT) is a trend emerging in information and communication technologies, and it has been ubiquitous for the last two decades. What do you mean by “Things”? A hardware device or an object of the physical world connected to the Internet is IOT. The Internet of Things (IoT) works for end-user devices, Mobile, Tablets, laptops, desktops, etc. In recent years, there has been an increasing number of broader devices connected to networks, including vehicles, smartphones, medical units, household devices, smart televisions, etc.
APA, Harvard, Vancouver, ISO, and other styles
30

Kshitij, Dwivedi, Dharod Jinansh, Dodia Dhruv, Chaugule Archana, and Bhelande Manish. "Smart Switches Using IOT." Journal of Sensor Research and Technologies 2, no. 3 (2020): 1–4. https://doi.org/10.5281/zenodo.4305378.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Kumar, Sumit, and Zahid Raza. "Internet of Things." International Journal of Systems and Service-Oriented Engineering 7, no. 3 (2017): 32–52. http://dx.doi.org/10.4018/ijssoe.2017070103.

Full text
Abstract:
Internet of Things (IoT) is a novel approach of connecting things/objects and thus transmitting information between various entities of the physical world or to the control centers where this information can be interpreted. IoT has been poised as the next evolution of internet promising to change our lives by involving a seamless access to people and devices in a ubiquitous way leading to a smart world. These devices, often referred to as smart items or intelligent things can be home appliances, healthcare devices, vehicles, buildings, factories and almost anything networked and fitted with sensors, actuators, and/or embedded computers. IoT promises to make the world smarter and proactive by enabling things to talk and others to understand. This work first presents an insight into the origin of IoT and its network as well as data centric architecture while listing the major possibilities. The seemingly important role and challenges of using Wireless Sensor Networks (WSN) which acts as the base in sensing and monitoring has been discussed. Since, the future lies in utility computing, best realized in the form of cloud computing, a cloud centric view of IoT is also presented.
APA, Harvard, Vancouver, ISO, and other styles
32

Taoufik Ben Hassine. "Internet of Intelligent Things (IoIT)." World Journal of Advanced Research and Reviews 22, no. 3 (2024): 1062–66. http://dx.doi.org/10.30574/wjarr.2024.22.3.1816.

Full text
Abstract:
Internet of Intelligent Things (IoIT) is a combination and integration of Internet of Things (IoT) and Artificial Intelligence (AI). The first brings the physical world into the digital world and the second takes advantage of this fact to bring intelligence to form an artificially intelligent physical world. This paper attempts to humanize the physical objects of the IoT so that they become conscious, committed to collective objectives and educable like humans. This is possible and achievable thanks to the grandiose contribution of Artificial Intelligence. A specialized Transportation variant of the IoT is cited as a practical example of this marriage between IoT and AI. This practical example is the Internet of Vehicles (IoV) which concerns the field of land and air transport. This air transport takes advantage of Artificial Intelligence to make life easier for aerial objects and their human users.
APA, Harvard, Vancouver, ISO, and other styles
33

Et. al., Harish Kumar N,. "Mutual authentication and data security in IOT using hybrid mac id and elliptical curve cryptography." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 11 (2021): 501–7. http://dx.doi.org/10.17762/turcomat.v12i11.5913.

Full text
Abstract:
Internet of Things (IoT) is a new emergent technology of the Internet. The Internet that we use today runs with human interposing. The Internet of Things which is the extended version of the internet which aims to offer the machine to machine communication or the device may be referred to as objects we call it object to object communication, which is without the involvement of the humans. With the growth of IOT in the market there are many considerable subjects relating to privacy, authentication, data confidentiality, data protection and other problems where solutions to these issues to be derived. This paper works on providing Mutual authentication and data security. A light weight Approach has been employed by generating Hybrid MAC ID for mutual authentication and using Elliptical Curve for secure data transfer which provides authentication and data confidentiality in the IoT Network.
APA, Harvard, Vancouver, ISO, and other styles
34

Akash, Golaviya1* Madhuri Patel2 Mayur Jhala3. "Internet of things (IoT) and Its Applications." Science World a monthly e magazine 2, no. 11 (2022): 1927–31. https://doi.org/10.5281/zenodo.7373629.

Full text
Abstract:
The technological developments in this 21<sup>st</sup> century has a potential to influence our daily lives. Internet of things (IoT) is a network formed by interconnecting heterogeneous things or objects aimed to solve an addressed problem that generally requires interdisciplinary approaches. IoT provides each physical object/device with the opportunity to see, hear and talk with others so that they can share their knowledge and make decisions. The independence of humans to interact, contribute and collaborate on things have expanded with an increase in the use of mobile technology and smart devices from Healthcare/Medical (IoMT), Animal Health (IoAHT), Agriculture (IoAT), Diagnostic (IoDT). Future studies will need to seek ways to successfully empower the utility of IoT enabled technology in health of animal and human.
APA, Harvard, Vancouver, ISO, and other styles
35

Dinkar, Amit Kumar, Alimul Haque, Alamgir Hossain, Shams Raza, Moidur Rahman, and Ajay Kumar Choudhary. "Unveiling the Power of the Internet of Things: Exploring Services, Applications, and Overcoming Challenges." LatIA 2 (August 25, 2024): 108. http://dx.doi.org/10.62486/latia2024108.

Full text
Abstract:
The Internet of Things (IoT) has transcended its futuristic perception and become an omnipresent reality. Its pervasive nature encompasses devices, sensors, clouds, big data, and business interactions. This revolutionary concept amalgamates traditional embedded systems with wireless microsensors, automation-driven control systems, and other elements to establish a vast infrastructure. The integration of wireless communication, micro electro mechanical devices, and the Internet has given rise to novel IoT applications. The IoT is essentially a network of interconnected objects accessible through the Internet, each object uniquely identifiable. The advent of IPv6, superseding IPv4, plays a pivotal role in expanding the address space for IoT development. The primary objective of IoT applications is to imbue objects with intelligence, eliminating the need for human intervention. However, the proliferation of smart nodes and the exponential data generated by each node present new challenges pertaining to data privacy, scalability, security, manageability, and other critical issues, which we delve into in this comprehensive exploration
APA, Harvard, Vancouver, ISO, and other styles
36

Arora, Jyoti, Pooja Kherwa, and Meena Tushir. "A comprehensive survey on the significance of industrial Internet of Things, energy management and big data analytics." Journal of Information and Optimization Sciences 45, no. 2 (2024): 247–56. http://dx.doi.org/10.47974/jios-1544.

Full text
Abstract:
The adaptive worldwide network architecture made up of web-enabled, objects connected through internet generally defines the concept of Internet of Things (IoT). In today’s world, IoT is contributing towards the transformation of the traditional industries to the smart industries by integrating the concept of IoT based energy management system into the analytics-based information system of the industries. Manufacturing businesses have concluded that by providing a digital identity to their tangible resources through IoT-based solutions, they can gain higher clarity into their processes and massively improve them. To estimate and analyze the developments in this field, this paper conducts an in-depth survey on the significance of big data analytics and energy management in shaping the progress of the Industrial Internet of Things (IIoT). It briefs the components related to the building blocks of the IoT, its application in various domains, benefits and the major challenges faced for building IoT technologies. This review present cutting-edge research on how IoT technology adoption might propel the transformation of industrial companies that are energy-efficient and environmentally sustainable.
APA, Harvard, Vancouver, ISO, and other styles
37

Jiang, Linshan, Rui Tan, Xin Lou, and Guosheng Lin. "On Lightweight Privacy-preserving Collaborative Learning for Internet of Things by Independent Random Projections." ACM Transactions on Internet of Things 2, no. 2 (2021): 1–32. http://dx.doi.org/10.1145/3441303.

Full text
Abstract:
The Internet of Things (IoT) will be a main data generation infrastructure for achieving better system intelligence. This article considers the design and implementation of a practical privacy-preserving collaborative learning scheme, in which a curious learning coordinator trains a better machine learning model based on the data samples contributed by a number of IoT objects, while the confidentiality of the raw forms of the training data is protected against the coordinator. Existing distributed machine learning and data encryption approaches incur significant computation and communication overhead, rendering them ill-suited for resource-constrained IoT objects. We study an approach that applies independent random projection at each IoT object to obfuscate data and trains a deep neural network at the coordinator based on the projected data from the IoT objects. This approach introduces light computation overhead to the IoT objects and moves most workload to the coordinator that can have sufficient computing resources. Although the independent projections performed by the IoT objects address the potential collusion between the curious coordinator and some compromised IoT objects, they significantly increase the complexity of the projected data. In this article, we leverage the superior learning capability of deep learning in capturing sophisticated patterns to maintain good learning performance. Extensive comparative evaluation shows that this approach outperforms other lightweight approaches that apply additive noisification for differential privacy and/or support vector machines for learning in the applications with light to moderate data pattern complexities.
APA, Harvard, Vancouver, ISO, and other styles
38

Saideh, Marc, Jean-Paul Jamont, and Laurent Vercouter. "Opportunistic Sensor-Based Authentication Factors in and for the Internet of Things." Sensors 24, no. 14 (2024): 4621. http://dx.doi.org/10.3390/s24144621.

Full text
Abstract:
Communication between connected objects in the Internet of Things (IoT) often requires secure and reliable authentication mechanisms to verify identities of entities and prevent unauthorized access to sensitive data and resources. Unlike other domains, IoT offers several advantages and opportunities, such as the ability to collect real-time data through numerous sensors. These data contains valuable information about the environment and other objects that, if used, can significantly enhance authentication processes. In this paper, we propose a novel idea to building opportunistic sensor-based authentication factors by leveraging existing IoT sensors in a system of systems approach. The objective is to highlight the promising prospects of opportunistic authentication factors in enhancing IoT security. We claim that sensors can be utilized to create additional authentication factors, thereby reinforcing existing object-to-object authentication mechanisms. By integrating these opportunistic sensor-based authentication factors into multi-factor authentication schemes, IoT security can be substantially improved. We demonstrate the feasibility and effectivenness of our idea through illustrative experiments in a parking entry scenario, involving both mobile robots and cars, achieving high identification accuracy. We highlight the potential of this novel method to improve IoT security and suggest future research directions for formalizing and comparing our approach with existing techniques.
APA, Harvard, Vancouver, ISO, and other styles
39

Laguidi, Ahmed, Samiya Tamtam, and Youssef Mejdoub. "A technique to improve IoT connectivity based on NB-IoT and D2D communications." ITM Web of Conferences 52 (2023): 01010. http://dx.doi.org/10.1051/itmconf/20235201010.

Full text
Abstract:
The Internet of Things (IoT) can be defined as an environment in which object communicates with others objects to serve a meaningful purpose. The IoT is currently one of the unprecedented research areas for professionals and researchers. Every day, the unlimited benefits that it can bring to our lives and the demand for this technology is increasing. The IoT technology has the ability to improve our quality of life by connecting many objects, which we use, to communicate and cooperate. Indeed, it is possible to enable new applications, services and business opportunities in global sectors such as Smart Cities, Smart environment, Energy conservation, Home automation, Precise Agriculture, among others. This paper presents a brief overview of the IoT and provides a technique of IoT that can improve the connectivity of the objet. Our proposals consist in taking advantage of the extended coverage of the NB-IoT to extend the coverage of the Wi-Fi zone which does not exceed a few meters.
APA, Harvard, Vancouver, ISO, and other styles
40

Chang-Gyu, Cgseong, Kim Jung-Yee, and Park Doo-Jin. "Real-time object control system using open source platform." Indonesian Journal of Electrical Engineering and Computer Science 20, no. 1 (2020): 313–19. https://doi.org/10.11591/ijeecs.v20.i1.pp313-319.

Full text
Abstract:
Recently, the Internet of things(IoT) has received great attention, and the demand for IOT applications in various fields is increasing. But drawbacks of IoT, such as having to use dedicated equipment and having to pay for a flat fee monthly, do not satisfy the consumers&rsquo; demands. These shortcomings of IoT is causing the appearance of users who try to design the environment of IoT that responds their demands and naturally, attempts to have monitoring system through open-source hardware like Arduino. Open source hardware has attracted a great deal of attention for the diffusion of the Internet of things as a key element of the Internet construction. The emergence of open source hardware, which has the advantage of low cost and easy and fast development, has made it possible to embody the idea of object Internet application services. In this paper, we design and implement a system that controls the objects in real time using open source hardware and MQTT protocol.
APA, Harvard, Vancouver, ISO, and other styles
41

Mohammed, Mustafa Khan. "Investigating the Security Implications of the Internet of Things (IoT)." European Journal of Advances in Engineering and Technology 8, no. 7 (2021): 1–6. https://doi.org/10.5281/zenodo.13950888.

Full text
Abstract:
In today's hyperconnected world, the Internet of Things (IoT) promises convenience and innovations. The IoT is a game-changing technology paradigm that is changing people&rsquo;s lifestyles and the way they work. The proliferation of smart objects is driven by the rapid advancement of technology. There are various smart objects across different domains, from smart home-based appliances like smart thermostats to industrial machinery and transportation systems. For instance, the manufacturing industry leverages the use of IoT devices like sensors to monitor the performance of machines, discover equipment failures, and enhance production processes. What happens when the IoT appliances/devices designed to help industries turn into nightmare stuff? The security implications of IoT appliances have devastating effects. The security of IoT appliances is weak and is prone to attacks. IoT security is required to protect data breach incidents since IoT appliances do not encrypt their data while in transit over the internet, and their operations can not be detected by standard cybersecurity systems. Many enterprises are grappling with security challenges since IoT appliances were designed with inadequate security capabilities. Additionally, the proliferation and diversity of IoT appliances and communication channels elevate the threat landscape in an organization. Unfortunately, for some IoT devices with low storage and low power, it is nearly impossible to install security software. Moreover, IoT appliances may contain inherent malware and can inject the network once connected. This research paper discusses the security implications of IoT.
APA, Harvard, Vancouver, ISO, and other styles
42

Busanelli, Stefano, Simone Cirani, Lorenzo Melegari, Marco Picone, Mirco Rosa, and Luca Veltri. "A Sidecar Object for the Optimized Communication Between Edge and Cloud in Internet of Things Applications." Future Internet 11, no. 7 (2019): 145. http://dx.doi.org/10.3390/fi11070145.

Full text
Abstract:
The internet of things (IoT) is one of the most disrupting revolutions that is characterizing the technology ecosystem. In the near future, the IoT will have a significant impact on people’s lives and on the design and developments of new paradigms and architectures coping with a completely new set of challenges and service categories. The IoT can be described as an ecosystem where a massive number of constrained devices (denoted as smart objects) will be deployed and connected to cooperate for multiple purposes, such a data collection, actuation, and interaction with people. In order to meet the specific requirements, IoT services may be deployed leveraging a hybrid architecture that will involve services deployed on the edge and the cloud. In this context, one of the challenges is to create an infrastructure of objects and microservices operating between both the edge and in the cloud that can be easily updated and extended with new features and functionalities without the need of updating or re-deploying smart objects. This work introduces a new concept for extending smart objects’ support for cloud services, denoted as a sidecar object. A sidecar object serves the purpose of being deployed as additional component of a preexisting object without interfering with the mechanisms and behaviors that have already been implemented. In particular, the sidecar object implementation developed in this work focuses on the communication with existing IoT cloud services (namely, AWS IoT and Google Cloud IoT) to provide a transparent and seamless synchronization of data, states, and commands between the object on the edge and the cloud. The proposed sidecar object implementation has been extensively evaluated through a detailed set of tests, in order to analyze the performances and behaviors in real- world scenarios.
APA, Harvard, Vancouver, ISO, and other styles
43

Aldelaimi, Monira N., M. Anwar Hossain, and Mohammed F. Alhamid. "Building Dynamic Communities of Interest for Internet of Things in Smart Cities." Sensors 20, no. 10 (2020): 2986. http://dx.doi.org/10.3390/s20102986.

Full text
Abstract:
The Internet of things (IoT) is a growing area of research in the context of smart cities. It links a city’s physical objects that are equipped with embedded sensing, communicating, and computing technology. These objects possess the capability to connect and share data with minimal human intervention, which creates the potential to establish social relationships among them. However, it is challenging for an object to discover, communicate, and collaborate dynamically with other objects, such as social entities, and provide services to humans. This is due to the increase in the number of objects and the complexity in defining social-like relationships among them. The current research aims to address this by introducing an object architecture and defining a Dynamic Community of Interest Model (DCIM) for IoT objects. The proposed model will help IoT objects to socialize and build communities amongst themselves based on different criteria. In this approach, objects belonging to a community will collaborate with each other to collect, manipulate, and share interesting content and provide services to enhance the quality of human interactions in smart cities.
APA, Harvard, Vancouver, ISO, and other styles
44

Yousra, Abdul Alsahib S.aldeen, and Naseer Qureshi Kashif. "New Trends in Internet of Things, Applications, Challenges, and Solutions." TELKOMNIKA Telecommunication, Computing, Electronics and Control 16, no. 3 (2018): 1114–19. https://doi.org/10.12928/TELKOMNIKA.v16i3.8483.

Full text
Abstract:
Internet of things (IoT) refers to an innovation and advance field to introduce a new concept of technologies with various potential advantages. In IoT, different types of diverse smart devices and gadgets with smart communication interfaces are connected with each other and offers the plethora of services in our daily life. IoT has gained attention in all fields of life like e-home, e-commerce, e-health, smart grids, intelligent transportation systems, and e-governance. The objects in IoT increasing preponderance of entities and transform objects into new and real-world objects. In this review paper, we discuss the new trend in IoT, its applications and recent challenges and their solutions. In addition, the paper also elaborates the existing systems, IoT architecture and technical aspects with future trends in the field. This review will be helpful to new researchers to find the existing technologies and challenges in order to continue their research in the field.
APA, Harvard, Vancouver, ISO, and other styles
45

Poonkuzhal, S., M. Shobana, and J. Jeyalakshmi. "A deep transfer learning approach for IoT/IIoT cyber attack detection using telemetry data." Neural Network World 33, no. 4 (2023): 225–44. http://dx.doi.org/10.14311/nnw.2023.33.014.

Full text
Abstract:
The rise of internet connectivity across the globe increases the count of IoT (internet of things)/IIoT (industrial internet of things) devices exponentially. The objects/devices which are connected to the internet are always prone to malicious attacks at various levels, such as physical, network, fog, and applications, which exist in the IoT architecture. Many researchers have addressed this issue and designed their own solutions based on machine and deep learning techniques. It is undeniable that deep learning outperforms machine learning (ML), but it necessitates a massive amount of datasets with appropriate labels. In this work, the deep transfer learning (TL) technique has been adapted for gated recurrent unit (GRU). Each model is trained using a dataset that belongs to one source IoT device (source domain), and this trained model is used to classify the malicious traffic in another dataset that belongs to some other IoT device (target domain). This approach is used for binary classification. These transfer learning models have been evaluated using an IoT/IIoT telemetry dataset called ToN IoT which comprises the sensor data generated from the seven different types of IoT devices. The highest accuracy achieved by IoT garage door was upto 99.76% as a source domain by fixing IoT thermostat as target domain. These models were also evaluated using some more metrics such as precision, recall, F1-measure, training time and testing time. By implementing transfer learning based GRU model, the accuracy of the model is improved from 69.20% to 99.76%. Moreover, to prove the efficiency of the proposed model, it is compared with state of art deep learning model and its results were analyzed in a detailed manner.
APA, Harvard, Vancouver, ISO, and other styles
46

Ane, Tanjea, Masum Billah, and Tabatshum Nepa. "Performance of Internet of Things (IoT) Potential Applications in Education." Bangladesh Journal of Multidisciplinary Scientific Research 2, no. 2 (2020): 10–16. http://dx.doi.org/10.46281/bjmsr.v2i2.653.

Full text
Abstract:
Internet of Things (IoT) very fast growing interaction that has connected real and virtual objects anytime, anywhere though network. A variety of various connected objects influence the applications of education process which is like a new change with research opportunities and possibilities. In education ecosystem IoT emerges as rapidly dynamic technology for the improvement of traditional education system. This paper consists of five parts: firstly an overview of IoT use, secondly IoT application in education system, thirdly recent survey IoT work then discusses IoT impacts in the higher education and concludes the paper.
APA, Harvard, Vancouver, ISO, and other styles
47

Cirillo, Flavio, Fang-Jing Wu, Gürkan Solmaz, and Ernö Kovacs. "Embracing the Future Internet of Things." Sensors 19, no. 2 (2019): 351. http://dx.doi.org/10.3390/s19020351.

Full text
Abstract:
All of the objects in the real world are envisioned to be connected and/or represented, through an infrastructure layer, in the virtual world of the Internet, becoming Things with status information. Services are then using the available data from this Internet-of-Things (IoT) for various social and economical benefits which explain its extreme broad usage in very heterogeneous fields. Domain administrations of diverse areas of application developed and deployed their own IoT systems and services following disparate standards and architecture approaches that created a fragmentation of things, infrastructures and services in vertical IoT silos. Coordination and cooperation among IoT systems are the keys to build “smarter” IoT services boosting the benefits magnitude. This article analyses the technical trends of the future IoT world based on the current limitations of the IoT systems and the capability requirements. We propose a hyper-connected IoT framework in which “things” are connected to multiple interdependent services and describe how this framework enables the development of future applications. Moreover, we discuss the major limitations in today’s IoT and highlight the required capabilities in the future. We illustrate this global vision with the help of two concrete instances of the hyper-connected IoT in smart cities and autonomous driving scenarios. Finally, we analyse the trends in the number of connected “things” and point out open issues and future challenges. The proposed hyper-connected IoT framework is meant to scale the benefits of IoT from local to global.
APA, Harvard, Vancouver, ISO, and other styles
48

Sachin, Upadhyay. "ONGOING CHALLENGES AND RESEARCH OPPORTUNITIES IN INTERNET OF THINGS (IOT)." INTERNATIONAL JOURNAL OF ENGINEERING TECHNOLOGIES AND MANAGEMENT RESEARCH 5, no. 2 :SE (2018): 216–22. https://doi.org/10.5281/zenodo.1202147.

Full text
Abstract:
The Internet of Things (IoT) opens opportunities for handheld devices, home appliances, and software to share and communicate information on the Internet. Advances in the areas of embedded systems, computing, and networking are leading to an infrastructure composed of millions of heterogeneous devices. These devices will not simply convey information but process it in transit, connect peer to peer, and form advanced collaborations. This &ldquo;Internet of Things (IoT)&rdquo; infrastructure will be strongly integrated with the environment. This paper focuses on researching on the architecture and technology of Internet of Things. Moreover, the applications of Internet of Things are interpreted in this paper. We begin with general information security background of IoT and continue on with information security related challenges that IoT will encountered. Finally, we will also point out research directions that could be the future work for the solutions to the security challenges that IoT encounters. The future is Internet of Things, which will transform the real world objects into intelligent virtual objects.The Internet of Things (IoT) opens opportunities for handheld devices, home appliances, and software to share and communicate information on the Internet. Advances in the areas of embedded systems, computing, and networking are leading to an infrastructure composed of millions of heterogeneous devices. These devices will not simply convey information but process it in transit, connect peer to peer, and form advanced collaborations. This &ldquo;Internet of Things (IoT)&rdquo; infrastructure will be strongly integrated with the environment. This paper focuses on researching on the architecture and technology of Internet of Things. Moreover, the applications of Internet of Things are interpreted in this paper. We begin with general information security background of IoT and continue on with information security related challenges that IoT will encountered. Finally, we will also point out research directions that could be the future work for the solutions to the security challenges that IoT encounters. The future is Internet of Things, which will transform the real world objects into intelligent virtual objects.
APA, Harvard, Vancouver, ISO, and other styles
49

Poolayi, Somayyeh, and Amir H. Assadiyan. "Governance of IoT in order to Move ahead of the calendar & live the future today." Journal of Management and Accounting Studies 8, no. 3 (2020): 38–42. http://dx.doi.org/10.24200/jmas.vol8iss3pp38-42.

Full text
Abstract:
The Internet of Things (IoT) is a system of interrelated computing devices, mechanical and digital machines, objects, animals or people that are provided with unique identifiers and the ability to transfer data over a network without requiring human-to-human or human-to-computer interaction. The Internet of Things (IoT) world may be exciting, but there are serious technical challenges that need to address, especially by developers. In this handwriting, learn how to meet the security, analytics, and testing requirements for IoT applications. A thing, in the Internet of Things, can be a person with a heart monitor implant, a farm animal with a biochip transponder, an automobile that has built-in sensors to alert the driver when tire pressure is low -- or any other natural or man-made object that can be assigned an IP address and provided with the ability to transfer data over a network. IoT has evolved from the convergence of wireless technologies, micro-electromechanical systems (MEMS), micro services and the internet. The convergence has helped tear down the silo walls between operational technologies (OT) and information technology (IT), allowing unstructured machine-generated data to analyze for insights that will drive improvements. The Internet of things (IoT) is the interconnection via the Internet of computing devices embedded in everyday objects, enabling them to send and receive data. If one thing can prevent the Internet of things from transforming the way we live and work, it will be a breakdown in security. Therefore, there are some important challenges in privacy and maintaining security of the Internet of things. In this paper, we are going to list the typical items which can be major challenges facing IoT.
APA, Harvard, Vancouver, ISO, and other styles
50

Yashaswini, J. "A Review on IoT Security Issues and Countermeasures." Oriental journal of computer science and technology 10, no. 2 (2017): 454–59. http://dx.doi.org/10.13005/ojcst/10.02.28.

Full text
Abstract:
Internet of things (IoT) is a system of connected physical objects that are accessible through an internet. The things in IoT is an object that assigned with an IP address and have the ability to collect and transfer the data over a network without manual intervention. As IOT does not need any human to machine interaction, it seems to be one of the largest waves of revolution as per the research going on, hence security is needed. The quick development of IOT has derived with the challenges in terms of security of things. This paper focus on the general security issues in IoT and measures used to overcome with those security issues.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!