scholarly journals Embedded systems and the Internet of Things: Can low-cost gas sensors be used in risk assessment of occupational exposure?

2020 ◽  
Vol 17 (10) ◽  
pp. 495-503
Author(s):  
Lene N. Johannessen ◽  
Hans Jørgen Grimstad ◽  
Jens Emil Skjetne ◽  
Ida Nord Myklebust ◽  
Kristin V. Hirsch Svendsen
2017 ◽  
Author(s):  
JOSEPH YIU

The increasing need for security in microcontrollers Security has long been a significant challenge in microcontroller applications(MCUs). Traditionally, many microcontroller systems did not have strong security measures against remote attacks as most of them are not connected to the Internet, and many microcontrollers are deemed to be cheap and simple. With the growth of IoT (Internet of Things), security in low cost microcontrollers moved toward the spotlight and the security requirements of these IoT devices are now just as critical as high-end systems due to:


Author(s):  
Petar Radanliev ◽  
David De Roure ◽  
Pete Burnap ◽  
Omar Santos

AbstractThe Internet-of-Things (IoT) triggers data protection questions and new types of cyber risks. Cyber risk regulations for the IoT, however, are still in their infancy. This is concerning, because companies integrating IoT devices and services need to perform a self-assessment of its IoT cyber security posture. At present, there are no self-assessment methods for quantifying IoT cyber risk posture. It is considered that IoT represent a complex system with too many uncontrollable risk states for quantitative risk assessment. To enable quantitative risk assessment of uncontrollable risk states in complex and coupled IoT systems, a new epistemological equation is designed and tested though comparative and empirical analysis. The comparative analysis is conducted on national digital strategies, followed by an empirical analysis of cyber risk assessment approaches. The results from the analysis present the current and a target state for IoT systems, followed by a transformation roadmap, describing how IoT systems can achieve the target state with a new epistemological analysis model. The new epistemological analysis approach enables the assessment of uncontrollable risk states in complex IoT systems—which begin to resemble artificial intelligence—and can be used for a quantitative self-assessment of IoT cyber risk posture.


Author(s):  
H. B. Chi ◽  
M. F. N. Tajuddin ◽  
N. H. Ghazali ◽  
A. Azmi ◽  
M. U. Maaz

<span>This paper presents a low-cost PV current-voltage or <em>I-V</em> curve tracer that has the Internet of Things (IoT) capability. Single ended primary inductance converter (SEPIC) is used to develop the <em>I-V</em> tracer, which is able to cope with rapidly changing irradiation conditions. The <em>I-V</em> tracer control software also has the ability to automatically adapt to the varying irradiation conditions. The performance of the <em>I-V</em> curve tracer is evaluated and verified using simulation and experimental tests.</span>


Author(s):  
Tingting Wang ◽  
Juanyuan Hao ◽  
Jiaying Liu ◽  
Yanling Zhang ◽  
Qihua Liang ◽  
...  

Effective monitoring of hazardous gases at room-temperature is extremely indispensable in the “Internet of things” application; however, developing bifunctional gas sensors for the advanced sensing platform still remains a challenge....


Author(s):  
Bin Lin

The Internet of Things is another information technology revolution and industrial wave after computer, Internet and mobile communication. It is becoming a key foundation and an important engine for the green, intelligent and sustainable development of economic society. The new networked intelligent production mode characterized by the integration innovation of the Internet of Things is shaping the core competitiveness of the future manufacturing industry. The application of sensor network data positioning and monitoring technology based on the Internet of Things in industry, power and other industries is a hot field for the development of the Internet of Things. Sensor network processing and industrial applications are becoming increasingly complex, and new features have appeared in the sensor network scale and infrastructure in these fields. Therefore, the Internet of Things perception data processing has become a research hotspot in the deep integration process between industry and the Internet of Things. This paper deeply analyzes and summarizes the characteristics of sensor network perception data under the new trend of the Internet of Things as well as the research on location monitoring technology, and makes in-depth exploration from the release and location monitoring of sensor network perception data of the Internet of Things. Sensor network technology integrated sensor technology, micro-electromechanical system technology, wireless communication technology, embedded computing technology and distributed information processing technology in one, with easy layout, easy control, low power consumption, flexible communication, low cost and other characteristics. Therefore, based on the release and location monitoring technologies of sensor network data based on the Internet of Things in different applications, this paper studies the corresponding networking technologies, energy management, data management and fusion methods. Standardization system in wireless sensor network low cost, and convenient data management needs, design the iot oriented middleware, and develops the software and hardware system, the application demonstration, the results show that the design of wireless sensor network based on iot data monitoring and positioning technology is better meet the application requirements, fine convenient integration of software and hardware, and standardized requirements and suitable for promotion.


2020 ◽  
Vol 14 (1) ◽  
pp. 144-151 ◽  
Author(s):  
Sudip Misra ◽  
Sanku Kumar Roy ◽  
Arijit Roy ◽  
Mohammad S. Obaidat ◽  
Avantika Jha

2018 ◽  
Vol 7 (3) ◽  
pp. 1491
Author(s):  
Dr Chalasani Srinivas ◽  
Dr Srinivas Malladi

The Internet of Things (IoT) is growing in the web of an age-old IPv6 address for Internet connections and messages that arise between these and other devices and systems that work with the Internet. It is equipped with the unique ID and data transfer capability through the network. Among other things, tracking and tracking online travel is a major issue. Although there are many tracking techniques for moving objects, many are at risk. So there is a need for tracking the safety of an object Safety protocols should provide visibility and tracking of street objects in support of the Internet (IoT). This protocol is based on the RFID Identity System for IoT Objects. Existing ones do not provide authentication of sites that lead to fakes. Great use of energy. The proposed protocol improves road safety tracking using the base protocol light and SPDL. The requested protocol is intended to ensure accuracy, accuracy, confidentiality and encryption. To ensure safe monitoring of objects, the requested protocols use cryptic primitives that use HMAC concepts that are used to authenticate an object. This protocol introduction relies on code authentication code (CMC), which is used to reduce power consumption at low cost. The testing of a test network evaluates protocol implementation and is found to be safer and requires less calculation than existing protocols.  


Sign in / Sign up

Export Citation Format

Share Document