scholarly journals Overview of the Internet of Things Short Range Communication Technologies

Author(s):  
Tamas Balla ◽  
Zoltan Gal
Author(s):  
R. Habibi ◽  
A. A. Alesheikh

Thanks to the recent advances of miniaturization and the falling costs for sensors and also communication technologies, Internet specially, the number of internet-connected things growth tremendously. Moreover, geosensors with capability of generating high spatial and temporal resolution data, measuring a vast diversity of environmental data and automated operations provide powerful abilities to environmental monitoring tasks. Geosensor nodes are intuitively heterogeneous in terms of the hardware capabilities and communication protocols to take part in the Internet of Things scenarios. Therefore, ensuring interoperability is an important step. With this respect, the focus of this paper is particularly on incorporation of geosensor networks into Internet of things through an architecture for monitoring real-time environmental data with use of OGC Sensor Web Enablement standards. This approach and its applicability is discussed in the context of an air pollution monitoring scenario.


2019 ◽  
Vol 11 (9) ◽  
pp. 194 ◽  
Author(s):  
Sherali Zeadally ◽  
Farhan Siddiqui ◽  
Zubair Baig

Bluetooth technology started off as a wireless, short-range cable replacement technology but it has undergone significant developments over the last two decades. Bluetooth radios are currently embedded in almost all computing devices including personal computers, smart phones, smart watches, and even micro-controllers. For many of us, Bluetooth is an essential technology that we use every day. We provide an insight into the history of Bluetooth and its significant design developments over the last 25 years. We also discuss related issues (including security) and Bluetooth as a driving technology for the Internet of Things (IoT). Finally, we also present recent research results obtained with Bluetooth technology in various application areas.


2019 ◽  
Vol 8 (3) ◽  
pp. 19-22
Author(s):  
K. Sailaja ◽  
M. Rohitha

Security is a million dollar issue for all computer systems. Every week there is news of another major breakin to a commercial or government system. Also it is well known that many governments are actively engaged in cyber-warfare, trying to break into the systems of other governments and other groups. The Internet of Things is increasingly changing into an omnipresent computing service, requiring vast volumes of knowledge storage and process. Unfortunately, due to the unique characteristics of resource constraints, self-organization and short range communication in IoT, it always resorts to the cloud for outsourced storage and computation. Security is one of the major challenges faced by cloud based IoT. The standard file protection technique relies on password based encryption schemes and they are vulnerable to brute force attacks. The reason is that, for a wrongly guessed key, the decryption process yields an invalid-looking plaintext message, confirming the invalidity of the key, while for the correct key it outputs a valid-looking plaintext message, confirming the correctness of the guessed key. Honey encryption helps to minimise this vulnerability. Hence, this paper proposed an extended Honey Encryption (XHE) scheme for enhancing the security of the cloud based IoT.


Author(s):  
Faiza Medjek ◽  
Djamel Tandjaoui ◽  
Imed Romdhani ◽  
Nabil Djedjig

In the internet of things (IoT) vision, people, systems, and objects with sensing and/or actuating capabilities communicate to monitor and control the physical world. Nowadays, the IoT concept has attracted significant attention from different application domain such as healthcare and smart homes. Indeed, self-organization and self-configuration are key characteristics of IoT given that IoT represents a pervasive environment where objects are resource-constrained and communication technologies are very ubiquitous. These characteristics in addition to the vulnerability of objects themselves and of the communication channels make IoT more susceptible to malicious attacks. In this context, a deep analysis of IoT security breach and vulnerabilities is necessary. This chapter presents IoT requirements and existing threats as well as security protocols and mechanisms. It specifically analyzes existing and new threats against the IoT's routing protocol (the routing protocol for low-power and lossy networks: RPL) and presents intrusion detection solutions (IDS) to counter RPL attacks.


Leonardo ◽  
2006 ◽  
Vol 39 (4) ◽  
pp. 357-363 ◽  
Author(s):  
Marc Tuters ◽  
Kazys Varnelis

Locative media has been attacked for being too eager to appeal to commercial interests as well as for its reliance on Cartesian mapping systems. If these critiques are well founded, however, they are also nostalgic, invoking a notion of art as autonomous from the circuits of mass communication technologies, which the authors argue no longer holds true. This essay begins with a survey of the development of locative media, how it has distanced itself from net art and how it has been critically received, before going on to address these critiques and ponder how the field might develop.


2017 ◽  
pp. 260-277
Author(s):  
Mahmoud Elkhodr ◽  
Seyed Shahrestani ◽  
Hon Cheung

The Internet of Things (IoT) promises to revolute communications on the Internet. The IoT enables numerous business opportunities in fields as diverse as e-health, smart cities, smart homes, among many others. It incorporates multiple long-range, short-range, and personal area wireless networks and technologies into the designs of IoT applications. This will result in the IoT being pervasive in many areas which raise many challenges. This chapter reviews the major research issues challenging the IoT with regard to security, privacy, and management.


2020 ◽  
Vol 17 (2) ◽  
pp. 31-35
Author(s):  
Lorenzo Carosso ◽  
Luca Mattiauda ◽  
Marco Allegretti

AbstractInformation and Communication Technologies (ICT) have experienced a large application in many fields, such as smart homes, health monitoring, environmental monitoring, and a great number of studies is present in literature. In particular, it is expected that the Internet of Things (IoT) will become increasingly pervasive in everyday life. Among different technologies, devices based on Long Range (LoRa) and LoRaWAN stand out due to their relative low cost, low power consumption and large cover range. In this survey, recent papers investigating applications of LoRa modules have been selected. The different use-cases are presented with a comparison between communication parameters and results obtained.


Author(s):  
Mahmoud Elkhodr ◽  
Seyed Shahrestani ◽  
Hon Cheung

The Internet of Things (IoT) promises to revolute communications on the Internet. The IoT enables numerous business opportunities in fields as diverse as e-health, smart cities, smart homes, among many others. It incorporates multiple long-range, short-range, and personal area wireless networks and technologies into the designs of IoT applications. This will result in the IoT being pervasive in many areas which raise many challenges. This chapter reviews the major research issues challenging the IoT with regard to security, privacy, and management.


Sign in / Sign up

Export Citation Format

Share Document