Realizing the Wireless Technology in Internet of Things (IoT)

Author(s):  
Dimitrios G. Kogias ◽  
Emmanouel T. Michailidis ◽  
Gurkan Tuna ◽  
Vehbi Cagri Gungor
Sensors ◽  
2020 ◽  
Vol 20 (5) ◽  
pp. 1409
Author(s):  
Angus Wong ◽  
Yan Tai Chow

As satellite communications provide ubiquitous coverage, they play a key role in providing Internet connectivity in remote or marginalized areas, so as to enable the vision of a truly global connectivity of the Internet of Things (IoT). However, these areas often lack reliable electricity supply. Thus, this paper proposes a satellite internet access point powered by solar energy, so that a stable Internet connection can be provided. The access point provides Wi-Fi coverage so that sensors, IoT, and devices can connect to the access point using the Wi-Fi, a common wireless technology. Our design took some cost-saving measures to make it affordable and selected the components that require minimal maintenance operations. The satellite access point costs about USD $500, and can provide four days of Internet connectivity without solar energy.


Author(s):  
Ashish Tripathi ◽  
Arun Kumar Singh ◽  
Pushpa Choudhary ◽  
Prem Chand Vashist ◽  
K. K. Mishra

2019 ◽  
Vol 2 (4) ◽  
pp. 205-208 ◽  
Author(s):  
Dong Li

Abstract Despite intensive efforts, there are still enormous challenges in provision of healthcare services to the increasing aging population. Recent observations have raised concerns regarding the soaring costs of healthcare, the imbalance of medical resources, inefficient healthcare system administration, and inconvenient medical experiences. However, cutting-edge technologies are being developed to meet these challenges, including, but not limited to, Internet of Things (IoT), big data, artificial intelligence, and 5G wireless transmission technology to improve the patient experience and healthcare service quality, while cutting the total cost attributable to healthcare. This is not an unrealistic fantasy, as these emerging technologies are beginning to impact and reconstruct healthcare in subtle ways. Although the technologies mentioned above are integrated, in this review we take a brief look at cases focusing on the application of 5G wireless transmission technology in healthcare. We also highlight the potential pitfalls to availability of 5G technologies.


2017 ◽  
Vol 7 (1.5) ◽  
pp. 245 ◽  
Author(s):  
Abhiruchi Passi ◽  
Deepak Batra

Internet of Things or IoT has evolved and will play a major role in our lives in the near future. Though in the nascent stage, it conceptually means an interconnected network consisting of physical objects, wearables, machines, buildings, automobiles and a variety of other types of devices that contain embedded technology to communicate and sense or interact with their internal states or external environment. With the advent of next generation 5G wireless technology around 2020, a wave of globally connected digital society will come into existence. In this paper we will discuss about the benefits which will be provided to IoT with the onset of 5G wireless technology and the challenges which IoT will offer to 5G.


2019 ◽  
Vol 1343 ◽  
pp. 012059 ◽  
Author(s):  
Gerrit Bode ◽  
Marc Baranski ◽  
Markus Schraven ◽  
Alexander Kümpel ◽  
Thomas Storek ◽  
...  

2013 ◽  
Vol 712-715 ◽  
pp. 2753-2756 ◽  
Author(s):  
Xue Feng Zhao

Basing on the research of the network structure of the control system of the smart home and the characteristic of the wireless technology of the Bluetooth, it proposes an implementation of the control system of the smart home basing on the Bluetooth technology, builds the communication protocol architecture of the control subnet in smart home, and develops the smart home controller basing on the ARM9 S3C2440. In the control system of the smart home, it can implement the log, control, add, remove and other basic operations of the control sub net in the smart home system towards the household electrical appliances.


Current cryptographic techniques broadly specified as conventional cryptography is solely based on the solidity of the mathematical concepts. The advancements in quantum computing can use reversible logic to compute the keys and easily break the existing security in conventional computers. From the analysis of the network structure of Internet of Things (IOT) it is very clear that the entire backbone of the system would collapse if it is attacked or hacked. IOT is a wireless technology that connects “ANYTHING” around to the Internet. IOT is a revolution which should be protected from the attackers as it would lead to several losses which could even be fatal. Hence a strong provision for securing users data in IOT is a real challenge. This paper is attempted to review the fundamentals of Quantum Key Distribution, security aspects for IOT and to address how QKD can be used to secure a IOT system. The challenge encountered is to increase the range and increase the transmission rate of data in QKD systems and to check for a possible solution to adhere these systems with existing information security solutions


Author(s):  
Abhijit Biswas, Et. al.

Recently, in Internet era the most common technology ubiquitous to develop smart environment is Internet of things (IoT) and Wireless Sensor Networks (WSNs).These technologies deployed enormously to formulate wide applications in area of Smart homes, Industrial automation, and security destined applications and information trailing. The huge development in wireless technology is due to great exploration in MEMS concept and Embedded Systems. Huge evolution in this technique leads to access different Medium Access Control (MAC) protocol and this protocol used to access multiple nodes peculiarly in wireless channel. The projected MAC protocol designed to enhance network lifetime. Essentially, the network leads to lot of congestion due to non-availability of IoT equipment and less available resources for various environmental applications. The simulated performance ensures that the conventional algorithm limits their dynamic service quality for IoT based applications. The above setbacks motivate the researches to develop the survey in existing scheduling based MAC protocol by highlighting their parameters.


Sign in / Sign up

Export Citation Format

Share Document