scholarly journals The Internet of Things: Technological and Social Aspects

2016 ◽  
Vol 8 (1) ◽  
pp. 17-27 ◽  
Author(s):  
Grzegorz Sowa ◽  
Alina Marchlewska

Abstract The basic idea of is the Internet of Things is presence around us of a variety of things – such as RFID tags, sensors, actuators, mobile phones, etc. – which are able to interact with each other and cooperate with their neighbors to reach common goals. Semantic oriented IoT visions have also been proposed. The number of items involved in the future Internet is destined to become extremely high. Therefore, issues pertaining how to represent, store, interconnect, search, and organize information generated by the IoT will become very challenging. In this context, semantic technologies will play a key role. And creative approaches to visualizing data – humans are far better than computers at seeing patterns –frequently prove integral to the process of creating knowledge. From a privacy perspective, IoT is challenging because it operates in private settings, like homes, and presents an attack target that is harder to secure.

Author(s):  
Payam Barnaghi ◽  
Wei Wang ◽  
Cory Henson ◽  
Kerry Taylor

The Internet of Things (IoT) has recently received considerable interest from both academia and industry that are working on technologies to develop the future Internet. It is a joint and complex discipline that requires synergetic efforts from several communities such as telecommunication industry, device manufacturers, semantic Web, and informatics and engineering. Much of the IoT initiative is supported by the capabilities of manufacturing low-cost and energy-efficient hardware for devices with communication capacities, the maturity of wireless sensor network technologies, and the interests in integrating the physical and cyber worlds. However, the heterogeneity of the “Things” makes interoperability among them a challenging problem, which prevents generic solutions from being adopted on a global scale. Furthermore, the volume, velocity and volatility of the IoT data impose significant challenges to existing information systems. Semantic technologies based on machine-interpretable representation formalism have shown promise for describing objects, sharing and integrating information, and inferring new knowledge together with other intelligent processing techniques. However, the dynamic and resource-constrained nature of the IoT requires special design considerations to be taken into account to effectively apply the semantic technologies on the real world data. In this article the authors review some of the recent developments on applying the semantic technologies to IoT.


2021 ◽  
Vol 21 (3) ◽  
pp. 1-22
Author(s):  
Celestine Iwendi ◽  
Saif Ur Rehman ◽  
Abdul Rehman Javed ◽  
Suleman Khan ◽  
Gautam Srivastava

In this digital age, human dependency on technology in various fields has been increasing tremendously. Torrential amounts of different electronic products are being manufactured daily for everyday use. With this advancement in the world of Internet technology, cybersecurity of software and hardware systems are now prerequisites for major business’ operations. Every technology on the market has multiple vulnerabilities that are exploited by hackers and cyber-criminals daily to manipulate data sometimes for malicious purposes. In any system, the Intrusion Detection System (IDS) is a fundamental component for ensuring the security of devices from digital attacks. Recognition of new developing digital threats is getting harder for existing IDS. Furthermore, advanced frameworks are required for IDS to function both efficiently and effectively. The commonly observed cyber-attacks in the business domain include minor attacks used for stealing private data. This article presents a deep learning methodology for detecting cyber-attacks on the Internet of Things using a Long Short Term Networks classifier. Our extensive experimental testing show an Accuracy of 99.09%, F1-score of 99.46%, and Recall of 99.51%, respectively. A detailed metric representing our results in tabular form was used to compare how our model was better than other state-of-the-art models in detecting cyber-attacks with proficiency.


2012 ◽  
Vol 2012 ◽  
pp. 1-11 ◽  
Author(s):  
Federica Paganelli ◽  
David Parlanti

Current trends towards the Future Internet are envisaging the conception of novel services endowed with context-aware and autonomic capabilities to improve end users’ quality of life. The Internet of Things paradigm is expected to contribute towards this ambitious vision by proposing models and mechanisms enabling the creation of networks of “smart things” on a large scale. It is widely recognized that efficient mechanisms for discovering available resources and capabilities are required to realize such vision. The contribution of this work consists in a novel discovery service for the Internet of Things. The proposed solution adopts a peer-to-peer approach for guaranteeing scalability, robustness, and easy maintenance of the overall system. While most existing peer-to-peer discovery services proposed for the IoT support solely exact match queries on a single attribute (i.e., the object identifier), our solution can handle multiattribute and range queries. We defined a layered approach by distinguishing three main aspects: multiattribute indexing, range query support, peer-to-peer routing. We chose to adopt an over-DHT indexing scheme to guarantee ease of design and implementation principles. We report on the implementation of a Proof of Concept in a dangerous goods monitoring scenario, and, finally, we discuss test results for structural properties and query performance evaluation.


Crimen ◽  
2020 ◽  
Vol 11 (3) ◽  
pp. 255-271
Author(s):  
Sanja Milivojević ◽  
Elizabeth Radulski

The Internet of Things (IoT) is poised to revolutionise the way we live and communicate, and the manner in which we engage with our social and natural world. In the IoT, objects such as household items, vending machines and cars have the ability to sense and share data with other things, via wireless, Bluetooth, or Radio Frequency IDentification (RFID) technology. "Smart things" have the capability to control their performance, as well as our experiences and decisions. In this exploratory paper, we overview recent developments in the IoT technology, and their relevance for criminology. Our aim is to partially fill the gap in the literature, by flagging emerging issues criminologists and social scientists ought to engage with in the future. The focus is exclusively on the IoT while other advances, such as facial recognition technology, are only lightly touched upon. This paper, thus, serves as a starting point in the conversation, as we invite scholars to join us in forecasting-if not preventing-the unwanted consequences of the "future Internet".


IEEE Network ◽  
2017 ◽  
Vol 31 (5) ◽  
pp. 66-73 ◽  
Author(s):  
Ivan Farris ◽  
Sara Pizzi ◽  
Massimo Merenda ◽  
Antonella Molinaro ◽  
Riccaro Carotenuto ◽  
...  

Sensors ◽  
2021 ◽  
Vol 22 (1) ◽  
pp. 27
Author(s):  
Franco Cicirelli ◽  
Antonio Guerrieri ◽  
Andrea Vinci

The Internet of Things (IoT) and related technologies are promising in terms of realizing pervasive and smart applications, which, in turn, have the potential to improve the quality of life of people living in a connected world [...]


2018 ◽  
Vol 7 (4.37) ◽  
pp. 86
Author(s):  
Marwah Nihad ◽  
Alaa Hassan ◽  
Nadia Ibrahim

The field internet of things and Big Data has become a necessity in our everyday lives due to the broadening of its technology and the exponential increase in devices, services, and applications that drive different types of data. This survey shows the study of Internet of Things (IoT), Big Data, data management, and intermediate data. The survey discusses intermediate data on Big Data and Internet of Things (IoT) and how it is managed. Internet of Things (IoT) is an essential concept of a new technology generation. It is a vision that allows the embedded devices or sensors to be interconnected over the Internet. The future Internet of Things (IoT) will be greatly presented by the massive quantity of heterogeneous networked embedded devices that generate intensively "Big data". Referring to the term intermediate data as the information that is provoked as output data along the process. However, this data is temporary and is erased as soon as you run a model or a sample tool. Also, the existence of intermediate data in both of the Internet of Things (IoT) and Big Data are explained. Here, various aspects of the internet of things, Big Data, intermediate data and data management will be reviewed. Moreover, the schemes for managing this data and its framework are discussed.  


Sign in / Sign up

Export Citation Format

Share Document