IoT ecosystem faces fragmented future

Subject IoT ecosystem. Significance The market for the Internet of Things (IoT) or connected devices is expanding rapidly, with no manufacturer currently forecast to dominate the supply chain. This has fragmented the emerging IoT ecosystem, triggering questions about interoperability and cybersecurity of IoT devices. Impacts Firms in manufacturing, transportation and logistics and utilities are expected to see the highest IoT spending in coming years. The pace of IoT adoption is inextricably linked to that of related technologies such as 5G, artificial intelligence and cloud computing. Data privacy and security will be the greatest constraint to IoT adoption.

2019 ◽  
Vol 40 (1) ◽  
pp. 48-52 ◽  
Author(s):  
Peter Buell Hirsch

Purpose This viewpoint is intended to examine the issue of the monetization of personal data and the risks to companies that fail to understand this trend. Design/methodology/approach This paper reviews the recent literature on the use and abuse of personal data to identify relevant trends and issues. Findings It is likely, whether through blockchain technology or some other means, that individual consumers will be able to monetize their data. Research limitations/implications As a review of secondary sources rather than original sources, the findings are anecdotal and not comprehensive. Practical implications In the rapidly changing environment of data privacy and security, one should anticipate that the findings may become outdated by sudden events such as a new global data privacy breach. Social implications Ownership of personal data and its use or abuse is one of the single most important social issues in today’s world, with profound implications for civil society. Originality/value While there have been numerous studies cataloguing attempts to create monetization platforms for consumer data, there are not many studies on the reputational risks for companies in handling data from the Internet of Things.


2021 ◽  
Vol 19 (3) ◽  
pp. 163
Author(s):  
Dušan Bogićević

Edge data processing represents the new evolution of the Internet and Cloud computing. Its application to the Internet of Things (IoT) is a step towards faster processing of information from sensors for better performance. In automated systems, we have a large number of sensors, whose information needs to be processed in the shortest possible time and acted upon. The paper describes the possibility of applying Artificial Intelligence on Edge devices using the example of finding a parking space for a vehicle, and directing it based on the segment the vehicle belongs to. Algorithm of Machine Learning is used for vehicle classification, which is based on vehicle dimensions.


2019 ◽  
Vol 6 (1) ◽  
pp. 15-30 ◽  
Author(s):  
Yasmine Labiod ◽  
Abdelaziz Amara Korba ◽  
Nacira Ghoualmi-Zine

In the recent years, the Internet of Things (IoT) has been widely deployed in different daily life aspects such as home automation, electronic health, the electric grid, etc. Nevertheless, the IoT paradigm raises major security and privacy issues. To secure the IoT devices, many research works have been conducted to counter those issues and discover a better way to remove those risks, or at least reduce their effects on the user's privacy and security requirements. This article mainly focuses on a critical review of the recent authentication techniques for IoT devices. First, this research presents a taxonomy of the current cryptography-based authentication schemes for IoT. In addition, this is followed by a discussion of the limitations, advantages, objectives, and attacks supported of current cryptography-based authentication schemes. Finally, the authors make in-depth study on the most relevant authentication schemes for IoT in the context of users, devices, and architecture that are needed to secure IoT environments and that are needed for improving IoT security and items to be addressed in the future.


2020 ◽  
Vol 17 (5) ◽  
pp. 2388-2395
Author(s):  
M. Vivek Anand ◽  
S. Vijayalakshmi

IoT is changing the way for a world, where many of our daily objects will be connected with each other and will interact with their environment in order to collect information and automate certain tasks. IoT requires seamless authentication, data privacy, security, robustness against attacks, easy deployment, and self-maintenance. Protecting data in the internet of things is essential for making the IoT environment secure. In order to secure the data on the internet of things, the blockchain will provide distributed peer to peer networks. Blockchain-based internet of things is making a secure environment in the IoT environment. Data are stored in the form of images in IoT devices that are captured in various locations in the IoT environment for processing. Images are stored as data in the blockchain and it acts as a transaction. This paper expresses the environment of blockchain-based internet of things with image validation. This paper will explain this domain with an example of a criminal’s image identification with image processing techniques to provide better service to the cyber intelligence agency to find criminals easily. The identification of criminals is done by comparing the images of the criminals’ identification.


2017 ◽  
Vol 117 (9) ◽  
pp. 1842-1865 ◽  
Author(s):  
Bo Yan ◽  
Xiao-hua Wu ◽  
Bing Ye ◽  
Yong-wang Zhang

Purpose The Internet of Things (IoT) is used in the fresh agricultural product (FAP) supply chain, which can be coordinated through a revenue-sharing contract. The purpose of this paper is to make the three-level supply chain coordinate in IoT by considering the influence of FAP on market demand and costs of controlling freshness on the road. Design/methodology/approach A three-level FAP supply chain that comprises a manufacturer, distributor, and retailer in IoT is regarded as the research object. This study improves the revenue-sharing contract, determines the optimal solution when the supply chain achieves maximum profit in three types of decision-making situations, and develops the profit distribution model based on the improved revenue-sharing contract to coordinate the supply chain. Findings The improved revenue-sharing contract can coordinate the FAP supply chain that comprises a manufacturer, distributor, and retailer in IoT, as well as benefit all enterprises in the supply chain. Practical implications Resource utilization rate can be improved after coordinating the entire supply chain. Moreover, loss in the circulation process is reduced, and the circulation efficiency of FAPs is improved because of the application of IoT. The validity of the model is verified through a case analysis. Originality/value This study is different from other research in terms of the combination of supply chain coordination, FAPs, and radio frequency identification application in IoT.


2019 ◽  
Vol 38 (1) ◽  
pp. 165-179 ◽  
Author(s):  
Ying Ma ◽  
Kang Ping ◽  
Chen Wu ◽  
Long Chen ◽  
Hui Shi ◽  
...  

Purpose The Internet of Things (IoT) has attracted a lot of attention in both industrial and academic fields for recent years. Artificial intelligence (AI) has developed rapidly in recent years as well. AI naturally combines with the Internet of Things in various ways, enabling big data applications, machine learning algorithms, deep learning, knowledge discovery, neural networks and other technologies. The purpose of this paper is to provide state of the art in AI powered IoT and study smart public services in China. Design/methodology/approach This paper reviewed the articles published on AI powered IoT from 2009 to 2018. Case study as a research method has been chosen. Findings The AI powered IoT has been found in the areas of smart cities, healthcare, intelligent manufacturing and so on. First, this study summarizes recent research on AI powered IoT systematically; and second, this study identifies key research topics related to the field and real-world applications. Originality/value This research is of importance and significance to both industrial and academic fields researchers who need to understand the current and future development of intelligence in IoT. To the best of authors’ knowledge, this is the first study to review the literature on AI powered IoT from 2009 to 2018. This is also the first literature review on AI powered IoT with a case study of smart public service in China.


Author(s):  
Kamalendu Pal

The internet of things (IoT) is ushering a new age of technology-driven automation of information systems into the manufacturing industry. One of the main concerns with IoT systems is the lack of privacy and security preserving schemes for controlling access and ensuring the safety of the data. Many security issues arise because of the centralized architecture of IoT-based information systems. Another concern is the lack of appropriate authentication and access control schemes to moderate the access to information generated by the IoT devices in the manufacturing industry. Hence, the question that arises is how to ensure the identity of the manufacturing machinery or the communication nodes. This chapter presents the advantages of blockchain technology to secure the operation of the modern manufacturing industry in a trustless environment with IoT applications. The chapter reviews the challenges and threats in IoT applications and how integration with blockchain can resolve some of the manufacturing enterprise information systems (EIS).


Author(s):  
Alaa Ahmed Abbood ◽  
Qahtan Makki Shallal ◽  
Mohammed A. Fadhel

<p><span>Internet of Things (IoT) devices are spread in different areas such as e-tracking, e-commerce, e-home, and e-health, etc. Thus, during the last ten years, the internet of things technology (IoT) has been a research focus. Both privacy and security are the key concerns for the applications of IoT, and still face a huge number of challenges. There are many elements used to run the IoT technology which include hardware and software such as sensors, GPS, cameras, applications, and so forth. In this paper, we have analyzed and explain the technology of IoT along with its elements, security features, security issues, and threats that attached to each layer of IoT to guide the consideration of researchers into solve and understand the most serious problems in IoT environment.</span></p>


2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Lixin Liu ◽  
Justin Zuopeng Zhang ◽  
Wu He ◽  
Wenzhuo Li

PurposeRisks resulted from asymmetric information have become crucial barriers for commercial banks to implement supply chain finance (SCF) – mainly the inventory pledge financing (IPF). At the same time, online financial service providers (OFSPs) are emerging as strong competitors in the SCF market. As a result, commercial banks need to update their traditional SCF business models and alleviate their over-dependence on OFSPs.Design/methodology/approachThe authors employ a multi-case-study method to investigate how the Internet of things (IoT) and blockchain technologies can be jointly leveraged to mitigate SCF risks. In-depth interviews were conducted to depict the business models and their novel ecosystem to reinforce traditional banks' ability in SCF services.FindingsFrom the perspective of information asymmetry, the authors categorize IPF risks into three groups based on the principal-agent theory: collateral, warehousing and liquidity risk. The findings suggest that IoT can primarily improve traditional banks' information acquisition ability, and blockchain can facilitate credible information transformation, enabling banks to acquire knowledge from collaterals. Besides, the e-platform in the new architecture increases banks' involvement in the supply chain and builds a fair network to curtail warehousing risks. The employment of smart contracts and collaborative mechanism ensure process and outcome control in mitigating liquidity risks.Originality/valueThe research contributes to the literature by confirming the role of emerging technologies in reducing information asymmetry risks. Besides, the findings provide valuable insights for practitioners to promote effective practices and approaches in IPF.


Author(s):  
Sreelakshmi K. K. ◽  
Ashutosh Bhatia ◽  
Ankit Agrawal

The internet of things (IoT) has become a guiding technology behind automation and smart computing. One of the major concerns with the IoT systems is the lack of privacy and security preserving schemes for controlling access and ensuring the security of the data. A majority of security issues arise because of the centralized architecture of IoT systems. Another concern is the lack of proper authentication and access control schemes to moderate access to information generated by the IoT devices. So the question that arises is how to ensure the identity of the equipment or the communicating node. The answer to secure operations in a trustless environment brings us to the decentralized solution of Blockchain. A lot of research has been going on in the area of convergence of IoT and Blockchain, and it has resulted in some remarkable progress in addressing some of the significant issues in the IoT arena. This work reviews the challenges and threats in the IoT environment and how integration with Blockchain can resolve some of them.


Sign in / Sign up

Export Citation Format

Share Document