scholarly journals A longitudinal analysis of the public perception of the opportunities and challenges of the Internet of Things

PLoS ONE ◽  
2018 ◽  
Vol 13 (12) ◽  
pp. e0209472 ◽  
Author(s):  
Arkaitz Zubiaga ◽  
Rob Procter ◽  
Carsten Maple
PLoS ONE ◽  
2016 ◽  
Vol 11 (7) ◽  
pp. e0158450 ◽  
Author(s):  
Jiang Bian ◽  
Kenji Yoshigoe ◽  
Amanda Hicks ◽  
Jiawei Yuan ◽  
Zhe He ◽  
...  

Author(s):  
Yunus Topsakal

The public and private sectors will undergo a significant transformation with the use of blockchain technology, and this potential of blockchain technology will be influential in all areas of life. In addition, blockchain technology can help ease the integration of the Internet of Things, augmented reality, and artificial intelligence applications. The question of how such a technology that is in the process of development will be applied in areas such as taxation, notary operations, and banking, arises simultaneously. Studies related to blockchain technology have mainly been carried out in the fields of finance, logistics, banking, and education. However, there is a paucity of studies on blockchain technology in the tourism industry which has an important role in the global economy. Therefore, the potential of using blockchain technology in the tourism industry is evaluated in this chapter. For this purpose, the features, advantages, and disadvantages of blockchain technology are explained. The potential uses of blockchain technology in the tourism industry are then discussed.


2013 ◽  
Vol 765-767 ◽  
pp. 1726-1729
Author(s):  
Yan Bing Liu ◽  
Wen Jing Ren

Security and privacy is always the most important issues by the public in the Internet of Things. The core problems are associated with the diversifying of the Internet towards an Internet of things, and the different requirements to the security level for application. Therefore, this paper is to put forward an authentication model and protocol to cope with the problem. The protocol is adopted with attribute-based encryption to replace the traditional identity-based encryption (IBE), and then make formalization analysis to the security of the protocol by using BAN logic.


2021 ◽  
Vol 10 (5) ◽  
pp. 25327-2535
Author(s):  
Dr. K.Nagarathna rajur

It is a modern type of technology that empowers virtual and physical artefacts to interact and provide digitized services for each other, and includes the Internet of Things (IoT). But it has some benefits, but raises problems of single point of failure, anonymity, accountability, and data integrity due to the new structured design. Challenges like these stands in the path of the introduction of all the most interesting Internet of Things technologies. Bringing the Internet of Things through the public ledger might fix these issues. Decentralized ledger systems are comprised of blockchain as well as distributed ledgers. The introduction of the Internet of Things (IoT) to the blockchain will offer tremendous advantages. Blockchain integration in this paper offers a detailed exploration of how to combine the IoT technology with the IoT scheme. It is followed by reviewing the basic framework and addressing the problems inherent in the system's integration, explaining the advantages of it, and describing ways in which the blockchain can help to overcome such problems. Blockchain as a Service for IoT can illustrate how different protocol concepts can be applied using different service types on blockchain. After this, there would be an important section about the integration of artificial intelligence (AI) into the Internet of Things (IoT) and blockchain. Finally, potential study avenues will focus on ways of applying the Internet of Things (IoT) with blockchain are suggested. The open issues and challenges of 5G-enabled IoT for blockchain-based Industrial automation are also analyzed in the text.


Author(s):  
Pranjal Kumar

The growing use of sensor tools and the Internet of Things requires sensors to understand the applications. There are major difficulties in realistic situations, though, that can impact the efficiency of the recognition system. Recently, as the utility of deep learning in many fields has been shown, various deep approaches were researched to tackle the challenges of detection and recognition. We present in this review a sample of specialized deep learning approaches for the identification of sensor-based human behaviour. Next, we present the multi-modal sensory data and include information for the public databases which can be used in different challenge tasks for study. A new taxonomy is then suggested, to organize deep approaches according to challenges. Deep problems and approaches connected to problems are summarized and evaluated to provide an analysis of the ongoing advancement in science. By the conclusion of this research, we are answering unanswered issues and providing perspectives into the future.


Author(s):  
Kamal Alieyan ◽  
Ammar Almomani ◽  
Rosni Abdullah ◽  
Badr Almutairi ◽  
Mohammad Alauthman

In today's internet world the internet of things (IoT) is becoming the most significant and developing technology. The primary goal behind the IoT is enabling more secure existence along with the improvement of risks at various life levels. With the arrival of IoT botnets, the perspective towards IoT products has transformed from enhanced living enabler into the internet of vulnerabilities for cybercriminals. Of all the several types of malware, botnet is considered as really a serious risk that often happens in cybercrimes and cyber-attacks. Botnet performs some predefined jobs and that too in some automated fashion. These attacks mostly occur in situations like phishing against any critical targets. Files sharing channel information are moved to DDoS attacks. IoT botnets have subjected two distinct problems, firstly, on the public internet. Most of the IoT devices are easily accessible. Secondly, in the architecture of most of the IoT units, security is usually a reconsideration. This particular chapter discusses IoT, botnet in IoT, and various botnet detection techniques available in IoT.


Author(s):  
Kamal Alieyan ◽  
Ammar Almomani ◽  
Rosni Abdullah ◽  
Badr Almutairi ◽  
Mohammad Alauthman

In today's internet world the internet of things (IoT) is becoming the most significant and developing technology. The primary goal behind the IoT is enabling more secure existence along with the improvement of risks at various life levels. With the arrival of IoT botnets, the perspective towards IoT products has transformed from enhanced living enabler into the internet of vulnerabilities for cybercriminals. Of all the several types of malware, botnet is considered as really a serious risk that often happens in cybercrimes and cyber-attacks. Botnet performs some predefined jobs and that too in some automated fashion. These attacks mostly occur in situations like phishing against any critical targets. Files sharing channel information are moved to DDoS attacks. IoT botnets have subjected two distinct problems, firstly, on the public internet. Most of the IoT devices are easily accessible. Secondly, in the architecture of most of the IoT units, security is usually a reconsideration. This particular chapter discusses IoT, botnet in IoT, and various botnet detection techniques available in IoT.


2013 ◽  
Vol 347-350 ◽  
pp. 3343-3346
Author(s):  
Le Hui Huang ◽  
Xiang Qing Zhang

The development of the internet of things has been elevated to the height of the national strategy, and especially causes the public attention of IT circles. But the internet of things is inseparable from its technical platform, especially the support from cloud computing. The paper starts from the system structure of the internet of things, and discusses the architecture and implementation strategies of the internet of things platform.


Sign in / Sign up

Export Citation Format

Share Document