Future of voice control for consumer interactions with internet of things systems: in the context of integration with other services offered by traditional service providers

2016 ◽  
Author(s):  
M. Bugajski

2019 ◽  
Vol 8 (2S11) ◽  
pp. 3594-3600 ◽  

Big data analytics, cloud computing & internet of things are a smart triad which have started shaping our future towards smart home, city, business, country. Internet of things is a convergence of intelligent networks, electronic devices, and cloud computing. The source of big data at different connected electronic devices is stored on cloud server for analytics. Cloud provides the readymade infrastructure, remote processing power to consumers of internet of things. Cloud computing also gives device manufacturers and service providers access to ―advanced analytics and monitoring‖, ―communication between services and devices‖, ―user privacy and security‖. This paper, presents an overview of internet of things, role of cloud computing & big data analytics towards IoT. In this paper IoT enabled automatic irrigation system is proposed that saves data over ―ThingSpeak‖ database an IoT analytics platform through ESP8266 wifi module. This paper also summarizes the application areas and discusses the challenges of IoT.



Author(s):  
Promise Agbedanu ◽  
Anca Delia Jurcut

In this era of explosive growth in technology, the internet of things (IoT) has become the game changer when we consider technologies like smart homes and cities, smart energy, security and surveillance, and healthcare. The numerous benefits provided by IoT have become attractive technologies for users and cybercriminals. Cybercriminals of today have the tools and the technology to deploy millions of sophisticated attacks. These attacks need to be investigated; this is where digital forensics comes into play. However, it is not easy to conduct a forensic investigation in IoT systems because of the heterogeneous nature of the IoT environment. Additionally, forensic investigators mostly rely on evidence from service providers, a situation that can lead to evidence contamination. To solve this problem, the authors proposed a blockchain-based IoT forensic model that prevents the admissibility of tampered logs into evidence.



Author(s):  
Tong Zhou ◽  
Lein Harn

A traditional service provider of telecommunications is recognized as an authority which is trusted by the subscribers and the public. Ad hoc and Peer to Peer (P2P) networks have demonstrated advantages that service provider controlled networks lack, and they also exhibit self-organizing behaviors. A pure self-organizing network does not rely on any hierarchical management. Instead, it utilizes a web of trust for security. Its trust management is complicated and varies from node to node. In this article, we discuss a hybrid trust structure that leverages the involvement of an authority in a self-organizing network to increase trust levels between disconnected small-worlds. The new model will help service providers design more robust and innovative solutions for next generation networks and applications. [Article copies are available for purchase from InfoSci-on-Demand.com]



Sensors ◽  
2020 ◽  
Vol 20 (23) ◽  
pp. 6761
Author(s):  
Anjan Bandyopadhyay ◽  
Vikash Kumar Singh ◽  
Sajal Mukhopadhyay ◽  
Ujjwal Rai ◽  
Fatos Xhafa ◽  
...  

In the Internet of Things (IoT) + Fog + Cloud architecture, with the unprecedented growth of IoT devices, one of the challenging issues that needs to be tackled is to allocate Fog service providers (FSPs) to IoT devices, especially in a game-theoretic environment. Here, the issue of allocation of FSPs to the IoT devices is sifted with game-theoretic idea so that utility maximizing agents may be benign. In this scenario, we have multiple IoT devices and multiple FSPs, and the IoT devices give preference ordering over the subset of FSPs. Given such a scenario, the goal is to allocate at most one FSP to each of the IoT devices. We propose mechanisms based on the theory of mechanism design without money to allocate FSPs to the IoT devices. The proposed mechanisms have been designed in a flexible manner to address the long and short duration access of the FSPs to the IoT devices. For analytical results, we have proved the economic robustness, and probabilistic analyses have been carried out for allocation of IoT devices to the FSPs. In simulation, mechanism efficiency is laid out under different scenarios with an implementation in Python.



Sensors ◽  
2020 ◽  
Vol 20 (24) ◽  
pp. 7160
Author(s):  
Imanol Mugarza ◽  
Jose Luis Flores ◽  
Jose Luis Montero

New generation Industrial Automation and Control Systems (IACS) are providing advanced connectivity features, enabling new automation applications, services and business models in the Industrial Internet of Things (IIoT) era. Nevertheless, due to the extended attack surface and increasing number of cyber-attacks against industrial equipment, security concerns arise. Hence, these systems should provide enough protection and resiliency against cyber-attacks throughout their entire lifespan, which, in the case of industrial systems, may last several decades. A sound and complete management of security issues and software updates is fundamental to achieve such goal, since leading-edge security countermeasures implemented in the development phase may eventually become out-of-date. In this article, a review of the IEC 62443 industrial security standard concerning the security maintenance of IIoT systems and components is given, along with guidelines for the implementation of such processes. As concluded, the security issues and software updates management shall jointly be addressed by the asset owner, service providers and product suppliers. These security processes should also be compatible with the safety procedures established by safety standards.



2019 ◽  
Vol 11 (3) ◽  
pp. 168781401983379
Author(s):  
Xiaoqi Liang ◽  
Yonghui Dai ◽  
Hanjian Chen ◽  
Shengqi Lu

With the acceleration of global aging, the service of the aged has been widely concerned by the whole society. The traditional service mode has been challenged, and it is difficult to meet the needs of the aged. In order to provide better services for the aged, the construction of emotional intelligent service based on Internet of things is proposed in this article. First, the framework is introduced, and the architecture of the whole system is given. Second, the key technologies of emotional intelligence and Internet of things are described, which mainly include affective computing and data collection of Internet of things. Third, the implementation of the software and hardware is given, and the core functional modules are analyzed. As a whole, there are two main contributions of this article. One is to give the framework of emotional intelligence service system for the aged based on Internet of things, and the other is to analyze the emotional state and the physical data of the aged so that the early-warning and intelligent services can be provided for them.



Author(s):  
Maryam Pouryazdan ◽  
Claudio Fiandrino ◽  
Burak Kantarci ◽  
Dzmitry Kliazovich ◽  
Tolga Soyata ◽  
...  


2017 ◽  
Vol 33 (2) ◽  
pp. 175-190 ◽  
Author(s):  
Andy Hira ◽  
Katherine Reilly

With the spread of internet-based technologies, the sharing economy is emerging as a new and rapidly growing sector of the economy. This sector offers transformative potential for many other sectors of the economy, and possibilities for new economic activity and growth in the developing world. The sharing economy is a misnomer, as while there are possibilities for more cooperative economic approaches, the primary emphasis is on the reduction of transaction costs including the elimination of middlemen in sales between a good/service provider and a customer. In this introductory article to the special edition, we provide an overview of both the positive and negative potential for the contribution of the sharing economy to development. On the one hand, we find that the reduction in transactions costs and the low price of mobiles improves access to goods and services, and reduces the need for economies of scale for marginalized groups who lack access to capital and infrastructure. However, we point to the real obstacles that the poor experience in using internet-based platforms to start businesses or accumulate capital. We discuss the potential for labour substitution of traditional service providers, such as taxi drivers. In juxtaposition to some of its claimants, we find that the sharing economy changes the nature of institutional, regulatory and promotional challenges by the state and social groups, rather than reducing the need for them.



Internet of Things is a rising innovation that makes our world more astute. In recent years, there has been immense development in the realm of insightful gadgets for home mechanization. Such contraptions are planned so as to facilitate communication among individuals and everyday home obligations. This paper exhibits a voice-controlled smart home with multi-functions using ESP32 as the wireless choice. Voice control (using human voice to control any load like light, fan, ac, geyser, motor etc.). The voice-commands are recognized by a dedicated hardware module and the recognized data is sent to database using ESP32. On the accepting unit, raspberry pi peruses the information from the database and deciphers the directions verbally expressed by the client and controls the family unit apparatuses.



Sign in / Sign up

Export Citation Format

Share Document