A review of Internet of Things (IoT) using visible light optical camera communication in smart cars

2021 ◽  
pp. 1-18
Author(s):  
Geetika Aggarwal
Author(s):  
Tingting Wang ◽  
Juanyuan Hao ◽  
Jiaying Liu ◽  
Yanling Zhang ◽  
Qihua Liang ◽  
...  

Effective monitoring of hazardous gases at room-temperature is extremely indispensable in the “Internet of things” application; however, developing bifunctional gas sensors for the advanced sensing platform still remains a challenge....


Author(s):  
Erdinç Koç

This chapter gives brief information about internet of things (IoT) and then detailed knowledge of industrial internet of things (IIoT). Internet of things applications can be seen in different areas, such as smart cars, smart homes, smart cities, agriculture, healthcare, industry, etc. This study focuses on the industrial part. Industrial internet of things (IIoT) means internet of things (IoT) applications for industrial usage. IIoT give a chance to enterprise for tracking supply chains, monitoring production line operations, and real-time consumption of energy, managing stock, and transportation decisions. This study used case study method for developing theory about IIoT's contribution to enterprise productivity. IIoT applications can be adapted to which operations of the enterprise, and how it will contribute to enterprise productivity is explained in this chapter. The chapter discusses the projects that are within the vision of IIoT but not yet implemented and concludes with suggestions for future studies.


2019 ◽  
Vol 9 (23) ◽  
pp. 5103 ◽  
Author(s):  
Nguyen Cong Hoan ◽  
Nguyen Van Hoa ◽  
Vu Thanh Luan ◽  
Yeong Min Jang

Wireless technologies that are based on radio frequencies are currently widely used, with numerous applications around the world. However, they pose some disadvantages to human health. High frequencies can have potentially harmful effects on children, hospital patients, and even healthy people if the signal power exceeds the permitted standard. Conversely, the use of visible light for data transmission is a trend that presents new options, including optical wireless communication, optical camera communication, and visible light communication. This paper proposes a modulation scheme based on on-off keying in the time domain, which is applied to a monitoring system using optical camera communication. This scheme has various compatible supports for the global-shutter camera and rolling-shutter camera, which are popular commercially available cameras. Furthermore, this scheme facilitates a low-cost monitoring system. By using small light-emitting diodes (LEDs) and controlling the exposure time in a single camera, the camera, as a receiver, can simultaneously detect signals from up to 10 sensor devices in different positions at a maximum distance of up to 50 m, with a low error rate.


Author(s):  
Xalphonse Inbaraj

With the explosion of information, devices, and interactions, cloud design on its own cannot handle the flow of data. While the cloud provides us access to compute, storage, and even connectivity that we can access easily and cost-effectively, these centralized resources can create delays and performance issues for devices and information that are far from a centralized public cloud or information center source. Internet of things-connected devices are a transparent use for edge computing architecture. In this chapter, the author discusses the main differences between edge, fog, and cloud computing; pros and cons; and various applications, namely, smart cars and traffic control in transportation scenario, visual and surveillance security, connected vehicle, and smart ID card.


Symmetry ◽  
2019 ◽  
Vol 11 (11) ◽  
pp. 1388 ◽  
Author(s):  
Junchao Xiao ◽  
Hao Wu ◽  
Xiangxue Li

An internet of vehicles allows intelligent automobiles to interchange messages with other cars, traffic management departments, and data analysis companies about vehicle identification, accident detection, and danger warnings. The implementation of these features requires Internet of Things system support. Smart cars are generally equipped with many (hundreds or even thousands of) sensors and microcomputers so that drivers gain more information about travel. The connection between the in-vehicle network and the Internet can be leveraged by the attackers in a malicious manner and thus increases the number of ways the in-vehicle network can now be targeted. Protecting increasingly intelligent vehicle systems becomes more difficult, especially because a network of many different devices makes the system more vulnerable than ever before. The paper assumes a generic threat model in which attackers can access the controller area network (CAN) bus via common access points (e.g., Bluetooth, OBD-II, Wi-Fi, physical access, and cellular communication, etc). A machine learning based simplified attention (SIMATT)-security control unit (SECCU) symmetry framework is proposed towards a novel and lightweight anomaly detecting mechanism for the in-vehicle network. For this framework, we propose two new models, SECCU and SIMATT, and obtain state-of-the-art anomaly detecting performance when fusing the former to the latter. Regardless of the training phase or the detection phase, we strive to minimize the computational cost and thereby obtain a lightweight anomaly detection method. In particular, the SECCU model has only one layer of 500 computing cells and the SIMATT model has been improved to reduce its computational costs. Through substantial experiment comparisons (with various classical algorithms, such as LSTM, GRU, GIDS, RNN, or their variations), it is demonstrated that the SIMATT-SECCU framework achieves an almost optimal accuracy and recall rate.


2019 ◽  
Vol 55 (6) ◽  
pp. 334-336 ◽  
Author(s):  
P. Chavez‐Burbano ◽  
S. Vitek ◽  
S.R. Teli ◽  
V. Guerra ◽  
J. Rabadan ◽  
...  

Author(s):  
Aleksandr Smuskin

The author states that the era of the Internet of Things has come. It is noted that Russian law publications do not pay sufficient attention to the practical issues of law enforcement that arise from the implementation of the Internet of Things, specifically, criminalistic research and the use of smart things by law enforcement bodies. This study a first attempt at a general criminalistic analysis of implementing the concept of the Internet of Things in Russian research publications. While analyzing the practical implementation of this concept, the author concludes that it is necessary not just to single out a smart house, a smart car or smart things as different categories, but to unite them into a system of smart environment. It is noted that the elements of the public sphere of application for the Internet of Things deserve separate studies, while this article will only focus on everyday application. Modern obstacles to a large-scale implementation of the Internet of Things are identified. The criminalistic research of the Internet of Things and smart environment makes it possible to identify key systems that modern appliances form in this sphere, requirements to them, subsystems of a smart house, functions of smart cars and gadgets. It is stated that the criminalistic research of the subsystems of smart environment is possible with the help of scientific criminalistic findings in the sphere of electronic digital traces and electronic evidence. Key points of finding these traces are identified. The author methodically analyzes the kinds of criminalistically relevant information that could be obtained through the examination of sensors and the memory of smart things, a smart car and a smart house. The author also determines the functions whose analysis is vital for collecting evidentiary and orientation information. It is stated that all information from sensors and information devices is, in the end, accumulated in the management center, as well as in cloud and network services servers that work with the Internet of Things. It is stressed that all interactions with electronic digital traces in the devices that implement the concept of the Internet of Things should happen with the participation of a specialist to avoid a loss of data.


Sensors ◽  
2020 ◽  
Vol 20 (20) ◽  
pp. 5897
Author(s):  
Shantanu Pal ◽  
Michael Hitchens ◽  
Tahiry Rabehaja ◽  
Subhas Mukhopadhyay

There has been a tremendous growth in the number of smart devices and their applications (e.g., smart sensors, wearable devices, smart phones, smart cars, etc.) in use in our everyday lives. This is accompanied by a new form of interconnection between the physical and digital worlds, commonly known as the Internet of Things (IoT). This is a paradigm shift, where anything and everything can be interconnected via a communication medium. In such systems, security is a prime concern and protecting the resources (e.g., applications and services) from unauthorized access needs appropriately designed security and privacy solutions. Building secure systems for the IoT can only be achieved through a thorough understanding of the particular needs of such systems. The state of the art is lacking a systematic analysis of the security requirements for the IoT. Motivated by this, in this paper, we present a systematic approach to understand the security requirements for the IoT, which will help designing secure IoT systems for the future. In developing these requirements, we provide different scenarios and outline potential threats and attacks within the IoT. Based on the characteristics of the IoT, we group the possible threats and attacks into five areas, namely communications, device/services, users, mobility and integration of resources. We then examine the existing security requirements for IoT presented in the literature and detail our approach for security requirements for the IoT. We argue that by adhering to the proposed requirements, an IoT system can be designed securely by achieving much of the promised benefits of scalability, usability, connectivity, and flexibility in a practical and comprehensive manner.


Sign in / Sign up

Export Citation Format

Share Document