Hardware, Software Platforms, Operating Systems and Routing Protocols for Internet of Things Applications

Author(s):  
Amira Zrelli
2017 ◽  
Author(s):  
Rebin B. Khoshnaw ◽  
Dana F. Doghramach ◽  
Mazin S. Al-Hakeem

Author(s):  
Keeley Wilson

In the late 1990s, after Nokia developed the first smartphone (the “Communicator”), executives became increasingly sensitive to the importance of operating systems, data communications, and multimedia. It was also becoming clear that more complex business models would be needed to tap in to new opportunities. This chapter describes and analyzes how Nokia managed this transformation. It describes the development of the Communicator smartphone, the establishment of the Symbian OS, and the creation of an innovative camera phone. As the nature of the industry was changing and becoming more complex, it also looks at how Nokia responded by engaging with a wider ecosystem to develop the visual radio concept. These examples highlight the challenges that the new world of software platforms and application ecosystems raised for Nokia.


2019 ◽  
pp. 99-106
Author(s):  
Prakash Ramesh Gadekar ◽  
Avnish Raj Verma ◽  
Virendrakumar A. Dhotre

Author(s):  
Shen Xin En ◽  
Liu Si Ling ◽  
Fan Cheng Hao

In recent years, due to their frequent use and widespread use, IoT (Internet of Things) devices have become an attractive target for hackers. As a result of their limited network resources and complex operating systems, they are vulnerable to attacks. Using a honeypot can, therefore, be a very effective way of detecting malicious requests and capturing samples of exploits. The purpose of this article is to introduce honeypots, the rise of IoT devices, and how they can be exploited by attackers. Various honeypot ecosystems will be investigated further for capturing and analyzing information from attacks against these IoT devices. As well as how to leverage proactive strategies in terms of IoT security, it will provide insights on the attack vectors present in most IoT systems, along with understanding attack patterns.


Author(s):  
Aminu Bello Usman ◽  
Jairo A. Gutierrez ◽  
Abdullahi Baffa Bichi

The internet of things (IoT) is expected to influence both architecture and infrastructure of current and future smart cities vision. Thus, the requirement and effectiveness of making cities smarter demands suitable provision of secure and efficient communication networks between IoT networking devices. Trust-based routing protocols play an important role in IoT for secure information exchange and communications between IoT networking elements. Thus, this chapter presents the foundation of trust-based protocols from social science to IoT for secure smart city environments. The chapter outlines and discusses the key ideas, notions, and theories that may help the reader to understand the current status and the possible future trends of trust-based protocols in IoT networks for smart cities. The chapter also discusses the implications, requirements, and future research challenges of trust-based protocols in IoT for smart cities.


Sign in / Sign up

Export Citation Format

Share Document