Author(s):  
Jarogniew Rykowski ◽  
Wojciech Cellary

In this Chapter a new way of payments for Internet of Things services is proposed, based on a stream of anonymous pico-payments realized by means of pico-coins. System architecture and information flow are presented, showing fully automated way of contextual payments which protect customers' privacy. With the proposed stream of pico-payments, two basic problems of efficient and widely acceptable payment method for the Internet of Things are solved: privacy protection, and toleration of frequent unexpected disconnections.


Author(s):  
D. R. Kolisnyk ◽  
◽  
K. S. Misevych ◽  
S. V. Kovalenko

The article considers the issues of system architecture IoT-Fog-Cloud, considers the interaction between the three levels of IoT, Fog and Cloud for the effective implementation of programs for big data analysis and cybersecurity. The article also discusses security issues, solutions and directions for future research in the field of the Internet of Things and nebulous computing.


2015 ◽  
Vol 733 ◽  
pp. 804-810
Author(s):  
Yong Wei Mi ◽  
Rui Chang Wu ◽  
Yi Yong Li ◽  
Kai Zhang ◽  
Wei Wang ◽  
...  

With the development of the Internet of Things (IOT), its application in the field of health care has become more and more widely. Based on the introduction of the IOT system architecture, key technology and existing problems and the three layer general framework, combined with the actual characteristics of the hospital, an IOT-based medical equipment management system architecture, and application of Internet technology, sensing technology, communication technology and software information technology, analyzes the related key technologies of building in, including intelligent gateway, middleware, information management platform etc. in order to achieve intensive, digital and informatized medical equipment management mode.


Author(s):  
Muralidhar Kurni ◽  
Somasena Reddy K.

Connected devices have access to every part of our lives with the increasing implementation of the internet of things (IoT), from home automation, health and fitness, automobile, logistics, to smart cities, and industrial IoT. Therefore, it is only natural that IoT, connected devices, and automation find their application in agriculture, and as such, greatly enhance almost every facet of it. In recent decades, farming has undergone a variety of technological changes, becoming more industrialized and powered by technology. Farmers have gained effective control and efficiency over the process of raising livestock and growing crops through the use of various smart farming devices. Within this chapter, the authors discuss and analyze the advantages of using IoT within agriculture. They present the IoT system architecture to allow smart farming. This chapter also covers the advantages of integrating the blockchain into the agricultural field. Case studies are included in the end for your reference.


Author(s):  
Jiejie Cui ◽  
Xiang Li ◽  
Yang Wang

The traditional encrypted storage system is inefficient when it encrypts the data of the Internet of Things, and there are few IOT data nodes that can be encrypted in a short time. In order to solve the above problems, a new Internet of Things data effective information encryption storage system is proposed. The hardware and software of the system are mainly designed. The chip selected for the collector is TTSAD251, which can expand the collection range. The processor is set with multiple cores to reduce the system power consumption. The memory uses SPRTAN-2 chip as the structure chip. The software work consists of three parts: collecting effective information of Internet of Things big data, establishing encrypted documents and storing effective information of big data of Internet of Things. In order to detect the working effect of the system, the experimental comparison with the traditional system shows that the proposed encryption storage system can improve the storage range of big data effective information of the Internet of Things by 20.58%, and the work efficiency by 5.64%. Compared with the traditional system, the designed system also has obvious advantages in the number of big data node secrets. In different files, the average number of big data information node encryption in this system is about 166,700. The experimental data show that the designed system has ideal application performance and provides a reliable basis for related fields.


Sign in / Sign up

Export Citation Format

Share Document