scholarly journals Seleceted Wireless Communication Protocols and their Properties for Use in IoT Systems

Author(s):  
Róbert Rákay ◽  
Alena Galajdová ◽  
Jaroslav Šeminský ◽  
Ivan Cvitić

Abstract The article is focused on testing selected communication protocols for the Internet of Things. The aim of the experiments was to find a suitable communication protocol to build a smart device of home automation. The recent developments in the field of communication protocols and data processing are providing a new form of constrained communication, while describing how the Things talk to each other in the Internet of Things. With growing number of connected devices in industry and commercial field, there is a need for the devices which can handle the new forms of communication, handle sensors and operate the battery power. The gathered data is either processed on the “edge” of the network or on the cloud platforms. Authors present a comparison of selected newest communication protocols, while reflecting on the results of their experimental testing.

2021 ◽  
Vol 21 (3) ◽  
pp. 1-22
Author(s):  
Celestine Iwendi ◽  
Saif Ur Rehman ◽  
Abdul Rehman Javed ◽  
Suleman Khan ◽  
Gautam Srivastava

In this digital age, human dependency on technology in various fields has been increasing tremendously. Torrential amounts of different electronic products are being manufactured daily for everyday use. With this advancement in the world of Internet technology, cybersecurity of software and hardware systems are now prerequisites for major business’ operations. Every technology on the market has multiple vulnerabilities that are exploited by hackers and cyber-criminals daily to manipulate data sometimes for malicious purposes. In any system, the Intrusion Detection System (IDS) is a fundamental component for ensuring the security of devices from digital attacks. Recognition of new developing digital threats is getting harder for existing IDS. Furthermore, advanced frameworks are required for IDS to function both efficiently and effectively. The commonly observed cyber-attacks in the business domain include minor attacks used for stealing private data. This article presents a deep learning methodology for detecting cyber-attacks on the Internet of Things using a Long Short Term Networks classifier. Our extensive experimental testing show an Accuracy of 99.09%, F1-score of 99.46%, and Recall of 99.51%, respectively. A detailed metric representing our results in tabular form was used to compare how our model was better than other state-of-the-art models in detecting cyber-attacks with proficiency.


Author(s):  
Md Alimul Haque ◽  
Shameemul Haque ◽  
Kailash Kumar ◽  
Narendra Kumar Singh

The role of the internet of things (IoT) and cyberspace in a digital society is well recognized, and they have become tremendously popular due to certain features like the ability to ease the operational process of businesses and instant communication. Recent developments in the fields of wireless communication networks like 4G, 5G, and 6G with IoT applications have greatly benefited human welfare. Still, the rapid growth of various IoT applications focuses on automating different tasks and are trying to empower the inanimate physical objects to act without any human intervention. It has also contributed to unethical practices by hackers who use new tools and techniques to penetrate more complex or well-controlled environments and produce increased damage and even remain under the cover. The main objective of this chapter is to improve understanding of the challenges to secure future digital infrastructure while it is still evolving. In this context, a detailed review of the security-related issues, challenges, threats, and countermeasures in the IoT applications is presented.


2020 ◽  
Vol 29 (4) ◽  
pp. 1067-1073
Author(s):  
Jan Fagerberg ◽  
Bart Verspagen

Abstract According to Christopher Freeman technological revolutions play a key role in capitalist development. In this article, we ask to what extent more recent developments are consistent with the perspective advanced by Freeman. We focus on two issues in particular, the climate challenge and what has been dubbed “A Fourth Industrial Revolution” that is, advances in artificial intelligence and the proliferation of the internet of things.


Author(s):  
Felipe Viel ◽  
Luis Augusto Silva ◽  
Valderi Leithardt ◽  
Gabriel Villarubia González ◽  
Raimundo Celeste Ghizoni Teive ◽  
...  

The evolution and miniaturization of the technologies for processing, storage, and communication have enabled computer systems to process a high volume of information and make decisions without human intervention. Within this context, several systems architectures and models have gained prominences, such as the Internet of Things (IoT) and Smart Grids (SGs). SGs use communication protocols to exchange information, among which the Open Smart Grid Protocol (OSGP) stands out. In contrast, this protocol does not have integration support with IoT systems that use some already consolidated communication protocols, such as the Constrained Application Protocol (CoAP). Thus, this work develops the integration of the protocols OSGP and CoAP to allow the communication between conventional IoT systems and systems dedicated to SGs. Results demonstrate the effectiveness of this integration, with the minimum impact on the flow of commands and data, making possible the use of the developed CoAP-OSGP Interface for Internet of Things (COIIoT).


Author(s):  
Rahul Verma

The internet of things (IoT) is the new buzzword in technological corridors with most technology companies announcing a smart device of sorts that runs on internet of things (IoT). Cities around the world are getting “smarter” every day through the implementation of internet of things (IoT) devices. Cities around the world are implementing individual concepts on their way to becoming smart. The services are automated and integrated end to end using internet of things (IoT) devices. The chapter presents an array of internet of things (IoT) applications. Also, cyber physical systems are becoming more vulnerable since the internet of things (IoT) attacks are common and threatening the security and privacy of such systems. The main aim of this chapter is to bring more research in the application aspects of smart internet of things (IoT).


Sensors ◽  
2019 ◽  
Vol 19 (3) ◽  
pp. 603 ◽  
Author(s):  
Luís Nóbrega ◽  
Pedro Gonçalves ◽  
Paulo Pedreiras ◽  
José Pereira

Intelligent farming is one of the vast range of applications covered by the Internet of Things concept. Notwithstanding, such applications present specific requirements and constraints that are dependent on their purpose. A practical case on which that is particularly relevant is the SheepIT project, where an automated IoT-based system controls grazing sheep within vineyards, guaranteeing that they do not threaten cultures. Due to its rigid requirements, particularly regarding the deployment of the Wireless Sensor Network, Machine-2-Machine communications and necessary interactions with a computational platform available through the Internet, Internet Protocol-based solutions are not suitable. Consequently, a customized communication stack has been developed, that intends to meet the project requirements, from the physical to the Application Layers. Although it has been developed considering the SheepIT requirements, its use may be extended to more generic intelligent farming applications, since most of the requirements are directly related with the farming environment. This paper reviews the proposed stack and details the recent developments. Particularly, we focused on Internet of Things/Machine-2-Machine interaction, describing the design and deployment of a gateway that addresses the SheepIT service requirements. Additionally, and complementary to previously published results, we evaluate the gateway performance and show its feasibility and scalability in a real scenario.


Constrained devices are commonly used in the Internet of Things systems. Since these devices have limited communication and computation resources, communication protocols which are lightweight are needed. A lightweight protocol called Message Queue Telemetry Transport, which is a publish/subscribe messaging protocol, is utilized with the constrained devices. Hence, this paper is aimed at monitoring data by using machine-to-machine communication protocol with the help of an IoT device, Raspberry Pi.


Sign in / Sign up

Export Citation Format

Share Document