scholarly journals Toward Supplying Internet Everywhere and Anytime

Author(s):  
Ahmed Jawad Kadhim

Abstract The internet is a common style used to connect various types of networks, sensors and personal devices. Accessing and using the Internet need to permission from an internet service provider (ISP) which needs to pay some amount of money. Internet became for some people like the water and air and need it everywhere and anytime. It can be used in education, business, chatting, etc. Thus, it became as a third lung for the world. Moreover, it works as a backbone for the internet of things (IoT). However, the existed policies of providing Internet for people and IoT are expensive and not efficient in exploiting the available Internet packages. In this paper, a new policy to provide Internet service everywhere (at least in the cities) and any time (IWT) is proposed. It depends on the collaboration concept among users to share Internet account packages with each other to increase Internet availability and utilization. It can determine the time period and the number of allowed devices to connect and use the Internet account of other users. In addition, it determines which user device or IoT sensor should connect at which time depending on the priority. Moreover, it takes the overhead and energy and bandwidth consumption into account. From the simulation results, we concluded that applying IWT can enhance the work of IoT and make the Internet cheaper and increase the percentage of Internet availability.

2018 ◽  
Vol 176 ◽  
pp. 01002
Author(s):  
Baozhen Tian ◽  
Suihuai Yu ◽  
Jianjie Chu ◽  
Wenhua Li

Internet of things (IoT) as a new revolution in science and technology will bring new vitality to the design. IoT has become the third revolution of the world industry information development after the world experienced the computer and the Internet. With the development of industry information, IoT as Internet service and applications expand through intellisense, identification technology, pervasive computing and ubiquitous network convergence applications. IoT era is the era of intelligent products. This article elaborates on the aspects of design content, design objects, design procedures and methods, means of obtaining design requirements, design tools, and changes in design direction. In the era of IoT, industry designers should focus on the interaction between humans and smart products and the interaction between smart products.


2020 ◽  
Vol 9 (2) ◽  
pp. 136-138 ◽  
Author(s):  
Md. Siddikur Rahman ◽  
Noah C. Peeri ◽  
Nistha Shrestha ◽  
Rafdzah Zaki ◽  
Ubydul Haque ◽  
...  

2018 ◽  
Author(s):  
Henry Tranter

Security is always at the forefront of developing technologies. One can seldom go a week without hearing of a new data breach or hacking attempt from various groups around the world, often taking advantage of a simple flaw in a system’s architecture. The Internet of Things (IoT) is one of these developing technologies which may be at risk of such attacks. IoT devices are becoming more and more prevalent in everyday life. From keeping track of an individual’s health, to suggesting meals from items available in an individual’s fridge, these technologies are taking a much larger role in the personal lives of their users. With this in mind, how is security being considered in the development of these technologies? Are these devices that monitor individual’s personal lives just additional vectors for potential data theft? Throughout this survey, various approaches to the development of security systems concerning IoT devices in the home will be discussed, compared, and contrasted in the hope of providing an ideal solution to the problems this technology may produce.


2018 ◽  
Author(s):  
Henry Tranter

Security is always at the forefront of developing technologies. One can seldom go a week without hearing of a new data breach or hacking attempt from various groups around the world, often taking advantage of a simple flaw in a system’s architecture. The Internet of Things (IoT) is one of these developing technologies which may be at risk of such attacks. IoT devices are becoming more and more prevalent in everyday life. From keeping track of an individual’s health, to suggesting meals from items available in an individual’s fridge, these technologies are taking a much larger role in the personal lives of their users. With this in mind, how is security being considered in the development of these technologies? Are these devices that monitor individual’s personal lives just additional vectors for potential data theft? Throughout this survey, various approaches to the development of security systems concerning IoT devices in the home will be discussed, compared, and contrasted in the hope of providing an ideal solution to the problems this technology may produce.


Author(s):  
Yuji Huang ◽  
Aravindhan K

The present cyber-physical schemes and the Internet of Things (IoT) schemes comprise of both complex and simple interactions defining the different sources of the IoT systems such as cloud information and the edge internet service centres. All the modeling frameworks have been established on the virtualization dimensions that include both the cloud and the edge structures. Apart from that, the systems deal with big data based on the connections of various forms of services and networks. In that case, various forms of data uncertainties are evident. These uncertainties include elasticity and actuation uncertainties. As a result, this leads to a number of challenges that affect the process of testing these uncertainties in the big data systems. Nonetheless, there is a research gap present to effectively model and design the precise infrastructure frameworks that handle the necessities for evaluating these emergent big data uncertainties. With that regard, this scholastic paper focusses on the techniques used to generate and determine the deployment configurations used in the process of evaluating both the cloud and IoT systems. In this research, the survey will consider the actual-world application for analysing and monitoring the transceiver frameworks.


2020 ◽  
Vol 7 (1) ◽  
pp. 22-28
Author(s):  
Vladimir Eliseev ◽  
Anastasiya Gurina

  Abstract— The paper investigates the causes of widespread use by cybercriminals of the Internet of Things for organizing network attacks and other illegal use. An analysis of existing approaches and technologies for protecting networked computer devices is presented, as well as the main factors that prevent their use in the world of Internet of Things. An approach is suggested that ensures the integration of protective mechanisms directly into the composition of Things. Various variants of technology implementation are considered. Key aspects and potential ways of implementing the proposed approach are noted.Tóm tắt— Bài báo nghiên cứu về các phương thức được tội phạm mạng sử dụng rộng rãi trong Internet vạn vật (IoT), để tổ chức các tấn công mạng và các hành vi bất hợp pháp khác. Bài báo phân tích các phương pháp và công nghệ hiện có để bảo vệ các thiết bị kết nối mạng, cũng như các yếu tố chính để ngăn chặn việc sử dụng chúng trong IoT. Cách tiếp cận được đề xuất là đảm bảo việc tích hợp các cơ chế bảo vệ trực tiếp vào cấu trúc của IoT. Bài báo cũng xem xét các biến thể khác của việc thực hiện công nghệ này. Từ đó, đưa ra lưu ý về các khía cạnh chính và cách thức cài đặt tiềm năng để thực hiện phương pháp được đề xuất. 


2022 ◽  
pp. 168-180
Author(s):  
Sasikumar Gurumoorthy ◽  
L. Venkateswara Reddy ◽  
Sudhakaran Periakaruppan

Art colonnades and museums all over the world are the first option for individuals to visit for the enhancement of the cultural life of people. To ensure their safety, museums have established numerous cultural security measures. Traditional strategies do not obstruct their pace entirely. They only use a computer in the museum to check individuals at the entrance and exit. Therefore, the authors proposed a gallery anti-stealing device created on the internet-of-things (IoT) technology that ensures security through passive readers/writers of RFID. Radio frequency identification (RFID) remains a system that practices isolated data storing and recovery and offers object tracking with a unique identity code. The system then sends sound and light warning information, while the photographic camera structure is triggered to capture a picture at the same time. The recognition of the accuracy in the hardware component of the device can be additionally enhanced by the use of this technology to increase the safety of museum equipment.


Author(s):  
Patrice Seuwou ◽  
Vincent F. Adegoke

The opportunities offered by digital technology are enormous. The global social and economic system is being reconfigured at an incredible rate. Connectivity is increasingly reshaping our world and redefining the way we interact with our environment. The rise of digital technologies is transforming almost every aspect of modern life. More and more of our interactions are mediated by machines. Along with the rapid evolution comes the risks, threats, and vulnerabilities in the system for those who plan to exploit it. In this chapter, firstly, the authors explore the role of 5G, big data, the internet of things (IoT), artificial intelligence (AI), autonomous vehicles (AV), and cloud computing play in the context of smart societies; secondly, they analyse how the synergy between these technologies will be used by governments and other stakeholders around the world to improve the safety of citizens albeit increasingly relinquishing privacy rights and encouraging mass surveillance at the expense of liberty.


Sign in / Sign up

Export Citation Format

Share Document