Light-excited chemiresistive sensors integrated on LED microchips

Author(s):  
Xiao-Xue Wang ◽  
Suang Zhang ◽  
Yuan Liu ◽  
Jiangnan Dai ◽  
Hua-Yao Li ◽  
...  

With the rapid development of the Internet of things, light-excited gas sensors have aroused great attention to meet the increasing demand for room-temperature devices with high portability and low power...

Author(s):  
Tingting Wang ◽  
Juanyuan Hao ◽  
Jiaying Liu ◽  
Yanling Zhang ◽  
Qihua Liang ◽  
...  

Effective monitoring of hazardous gases at room-temperature is extremely indispensable in the “Internet of things” application; however, developing bifunctional gas sensors for the advanced sensing platform still remains a challenge....


Technologies ◽  
2021 ◽  
Vol 9 (1) ◽  
pp. 22
Author(s):  
Eljona Zanaj ◽  
Giuseppe Caso ◽  
Luca De Nardis ◽  
Alireza Mohammadpour ◽  
Özgü Alay ◽  
...  

In the last years, the Internet of Things (IoT) has emerged as a key application context in the design and evolution of technologies in the transition toward a 5G ecosystem. More and more IoT technologies have entered the market and represent important enablers in the deployment of networks of interconnected devices. As network and spatial device densities grow, energy efficiency and consumption are becoming an important aspect in analyzing the performance and suitability of different technologies. In this framework, this survey presents an extensive review of IoT technologies, including both Low-Power Short-Area Networks (LPSANs) and Low-Power Wide-Area Networks (LPWANs), from the perspective of energy efficiency and power consumption. Existing consumption models and energy efficiency mechanisms are categorized, analyzed and discussed, in order to highlight the main trends proposed in literature and standards toward achieving energy-efficient IoT networks. Current limitations and open challenges are also discussed, aiming at highlighting new possible research directions.


2019 ◽  
Vol 11 (3) ◽  
pp. 57 ◽  
Author(s):  
Lorenzo Vangelista ◽  
Marco Centenaro

The low-power wide-area network (LPWAN) paradigm is gradually gaining market acceptance. In particular, three prominent LPWAN technologies are emerging at the moment: LoRaWAN™ and SigFox™, which operate on unlicensed frequency bands, and NB-IoT, operating on licensed frequency bands. This paper deals with LoRaWAN™, and has the aim of describing a particularly interesting feature provided by the latest LoRaWAN™ specification—often neglected in the literature—i.e., the roaming capability between different operators of LoRaWAN™ networks, across the same country or even different countries. Recalling that LoRaWAN™ devices do not have a subscriber identification module (SIM) like cellular network terminals, at a first glance the implementation of roaming in LoRaWAN™ networks could seem intricate. The contribution of this paper consists in explaining the principles behind the implementation of a global LoRaWAN network, with particular focus on how to cope with the lack of the SIM in the architecture and how to realize roaming.


Author(s):  
Dani Sasmoko ◽  
Dzyo Bachtiar

Internet of Things (IoT) connects a global infrastructure in communities so they can take benefit of advanced services, by connecting objects (things) both physical and virtual with the Internet so that objects can communicate each other. The object of this study is a baby box to control the baby’s condition. When the baby cries too long it may cause Baby Distressed Tantrum which is the feeling of being depressed in the baby because they feel ignored. If this happens for a long time will endanger the baby's health as it is related to respiratory function and cardiac performance. The function of the baby box is to observe a baby when left without supervision. It will enable users to know if the baby is sleeping, awake or crying. Leaving a crying baby too long may have a negative effect. By applying the Internet of Things (IoT) in the design of an intelligent a baby box will help the parents and babysitter in controlling the baby if they have other activities to do. The baby box monitoring system has a dht11 temperature and humidity sensor, and a noise sensor to detect the baby crying. An esp8266 module on Wemos d1 will send data to an android smartphone and notify the user by sound or vibration.


Electronics ◽  
2019 ◽  
Vol 8 (9) ◽  
pp. 978 ◽  
Author(s):  
Yunfa Li ◽  
Yifei Tu ◽  
Jiawa Lu

With the increasing demand for intelligent services of the Internet of Things (IoT), its security issues have attracted widespread attention recently. Since most of the existing identity authentication policies are based on a single authentication mode, they are highly likely to cause problems such as illegal operation and stealing of sensor information. In order to meet the needs of increasing IoT users for the security management of intelligent services, a multi-point collaborative authentication method based on user image intelligent collection for the security problems faced by IoT in identity authentication is proposed in the paper. This method firstly collects the identity of the legal user through the intelligent collection technology and then realizes the identity authentication of the unidentified user through the collaborative authentication between the local domain management machine, the back-end image management machine, and the cloud server. Compared with the traditional single identity authentication method, our method uses three-party collaborative authentication to avoid the problem of sensor information stealing easily caused by a single authentication method, which makes the user’s identity authentication more secure and effective. The security analysis shows that the method is able to resist multiple attacks and prevent the sensor information from being illegally operated and stolen, protecting the security of the sensor information.


2012 ◽  
Vol 452-453 ◽  
pp. 932-936
Author(s):  
Xiang Dong Hu ◽  
Peng Qin Yu

With the rapid development of ubiquitous network and its applications, the key technologies of the Internet of things are actively researched all over the world. The Internet of things has tremendous attraction for adversaries, and it is easily attacked due to poor resource and non-perfect distribution of sensor nodes, then false data maybe be injected into network. Security is one of the most important demands for applications in the Internet of things, an algorithm of malicious nodes detection is proposed to protect the network from destruction based on weighted confidence filter, namely, the cluster heads take charge of collecting messages from nodes and computing their average of confidence in cluster-based network, then they aggregate data from nodes with higher confidence than average and ignore the others, they update confidence of each node by comparing the aggregation value and the received data, and regard it as the weight of exactness of message from node. A sensor node is judged to be a malicious one if its weight is lower than the set threshold. The simulation results show that the algorithm can detect malicious nodes with high detection ratio, low false alarm ratio and outstanding scalability.


Author(s):  
Adam Dunkels ◽  
Joakim Eriksson ◽  
Niclas Finne ◽  
Fredrik Osterlind ◽  
Nicolas Tsiftes ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document