scholarly journals Bluemergency: Mediating Post-disaster Communication Systems using the Internet of Things and Bluetooth Mesh

Author(s):  
Flor Alvarez ◽  
Lars Almon ◽  
Hauke Radtki ◽  
Matthias Hollick
Author(s):  
Ranjan Navin

Abstract: The Internet of Things (IoT) is the most recent technology platform. We may regulate our daily routine work, such as home applications, control, and simple communication systems, using IOT, and improve our digital services. The Internet of Things (IoT) is a system that intelligently adds everyday content information to the internet in order to facilitate communication between objects and humans, as well as among themselves. In this study, we demonstrate how IoT can improve home automation. The relay, Node MCU, which is a network access component, is used in our suggested system. We can control that equipment using an IoT-based system technique. Mobile phones, computers, and tablets are used as user interfaces in home automation systems. They can connect to the home automation network through a wireless internet connection. The user will interact with the system directly via the control interface, while home appliances will be controlled remotely via a mobile app. An additional aspect of the home automation system is that it may be protected remotely. This redesigned design concept provided a home automation system that could be controlled efficiently. Keywords: IOT, home automation, smart home, relay, response time, Node MCU (ESP8266)


Author(s):  
Yaroslav Mikhnenko ◽  
Mariia Skulysh ◽  
Vasil Kurdecha ◽  
Galyna Mikhnenko

Background. The IoT technology covers devices and appliances, such as thermostats, home security systems and cameras, lighting fixtures as well as other household appliances that support one or more shared ecosystems, and can be controlled by devices associated with that ecosystem, for example with smartphones and smart speakers. However, there are a lot of problems to be solved. One of these problems is the power supply of wireless sensors on the Internet of Things. Objective. The purpose of the study is to reduce energy consumption of IoT devices in the process of transmitting the collected data by regulating the number of transmission transactions. Methods. The analysis of the existing energy saving methods in IoT devices shows that the problem of choosing the optimal buffer size has not yet been solved. An optimization problem has been formulated, which allows considering the requirements for the quality of transmission of both information flows and communication systems that provide this transfer. Results. The article presents the modified method of information transmission to improve the energy efficiency of the network. The need to allocate a queue buffer at each of the nodes and explain the operation of the node using the queue buffer has been highlighted. The scheme of the project with the use of the modified Sleep / Wake algorithm has been created. Conclusions. The main idea of the method is to allocate a buffer at each node with a certain threshold value, and if the latter is exceeded, the transmission of information packets will begin. This increases the service life of WSN by 14.8… 20.6% compared to the IoT sensor networks that use an asynchronous queue cycle. Keywords: IoT; energy efficiency; life expectancy of the IoT network.


Cybersecurity ◽  
2021 ◽  
Vol 4 (1) ◽  
Author(s):  
Ansam Khraisat ◽  
Ammar Alazab

AbstractThe Internet of Things (IoT) has been rapidly evolving towards making a greater impact on everyday life to large industrial systems. Unfortunately, this has attracted the attention of cybercriminals who made IoT a target of malicious activities, opening the door to a possible attack on the end nodes. To this end, Numerous IoT intrusion detection Systems (IDS) have been proposed in the literature to tackle attacks on the IoT ecosystem, which can be broadly classified based on detection technique, validation strategy, and deployment strategy. This survey paper presents a comprehensive review of contemporary IoT IDS and an overview of techniques, deployment Strategy, validation strategy and datasets that are commonly applied for building IDS. We also review how existing IoT IDS detect intrusive attacks and secure communications on the IoT. It also presents the classification of IoT attacks and discusses future research challenges to counter such IoT attacks to make IoT more secure. These purposes help IoT security researchers by uniting, contrasting, and compiling scattered research efforts. Consequently, we provide a unique IoT IDS taxonomy, which sheds light on IoT IDS techniques, their advantages and disadvantages, IoT attacks that exploit IoT communication systems, corresponding advanced IDS and detection capabilities to detect IoT attacks.


Author(s):  
S. Vinod Kumar ◽  
C. D. Singh ◽  
K. Upendar

Precise irrigation plays an essential role in agricultural production and its management. Based on current conditions and historical records, profitability in the farming sector depends on making the right and timely operational decision. For the last two decades, especially in India, climate change, groundwater depletion, and erratic variation in rainfall have affected crop production significantly.  Due to advancements in technologies and reduction in size, sensors are becoming involved in almost every field of life. Agriculture is one such domain where sensors and their networks are successfully used to get numerous benefits from them. In this paper, a review of the scope of smart irrigation using IoT has been discussed. The scarcity of agricultural workers in irrigation can be compensated by the Internet of Things (IoT) platform. The various parameters, such as soil moisture, soil temperature, humidity, and pH, have been collected using the Internet of Things (IoT) platform, equipped with sensors and wireless communication systems (WSN).


2021 ◽  
Vol 2021 ◽  
pp. 1-12
Author(s):  
M. Sathya ◽  
M. Jeyaselvi ◽  
Lalitha Krishnasamy ◽  
Mohammad Mazyad Hazzazi ◽  
Prashant Kumar Shukla ◽  
...  

The Internet of Things (IoT) is enhancing our lives in a variety of structures, which consists of smarter cities, agribusiness, and e-healthcare, among others. Even though the Internet of Things has many features with the consumer Internet of Things, the open nature of smart devices and their worldwide connection make IoT networks vulnerable to a variety of assaults. Several approaches focused on attack detection in Internet of Things devices, which has the longest calculation times and the lowest accuracy issues. It is proposed in this paper that an attack detection framework for Internet of Things devices, based on the DWU-ODBN method, be developed to alleviate the existing problems. At the end of the process, the proposed method is used to identify the source of the assault. It comprises steps such as preprocessing, feature extraction, feature selection, and classification to identify the source of the attack. A random oversampler is used to preprocess the input data by dealing with NaN values, categorical features, missing values, and unbalanced datasets before being used to deal with the imbalanced dataset. When the data has been preprocessed, it is then sent to the MAD Median-KS test method, which is used to extract features from the dataset. To categorize the data into attack and nonattack categories, the features are classified using the dual weight updation-based optimal deep belief network (DWU-ODBN) classification technique, which is explained in more detail below. According to the results of the experimental assessment, the proposed approach outperforms existing methods in terms of detecting intrusions and assaults. The proposed work achieves 77 seconds to achieve the attack detection with an accuracy rate of 98.1%.


Sign in / Sign up

Export Citation Format

Share Document