scholarly journals A Review on the Security of the Internet of Things (IoT)

Internet of things (IoT) is a wireless medium that facilitate to human for the communication over the internet via sensors to control their home appliance withtheir mobile phones, smart watches. It makes to easy human life. IoT used in human’s daily life like homes, offices and hospitals etc. But the most important thing is data (in which include user’s personal information like passwords or location etc.) security while data transmitted from one end to another end over the internet. The main focus of this paper is IoT related security and vulnerabilities that are caused the security and existing solutions and compare the existing study results to measure the issues.

2021 ◽  
Vol 34 (02) ◽  
pp. 1032-1038
Author(s):  
Arya Majidi

Population growth and urbanization have led to an increase in the rate of waste production, the lack of timely and proper management of which will have adverse effects on human life and the environment. Since most of the waste management costs are spent on waste collection and transportation, it is necessary to find solutions to control the huge costs of this sector. On the other hand, today, intelligent technologies are used globally as solutions to meet challenges in various fields such as agriculture to improve agro-industrial production, transportation, and waste management, which creates a concept called smart cities. One of the categories that has changed the concept of cities and made them have easier and smarter answers to various events and needs is the "Internet of Things", in which many cases and infrastructures with new hardware technologies and Software are integrated. Waste collection is no exception to this rule and efforts have been made to make it smarter. In this research, some of the latest innovations presented globally in order to make trash smarter have been examined.


2019 ◽  
Author(s):  
Vaclav Janecek

This article analyses, defines, and refines the concepts of ownership and personal data to explore their compatibility in the context of EU law. It critically examines the traditional dividing line between personal and non-personal data and argues for a strict conceptual separation of personal data from personal information. The article also considers whether, and to what extent, the concept of ownership can be applied to personal data in the context of the Internet of Things (IoT). This consideration is framed around two main approaches shaping all ownership theories: a bottom-up and top-down approach. Via these dual lenses, the article reviews existing debates relating to four elements supporting introduction of ownership of personal data, namely the elements of control, protection, valuation, and allocation of personal data. It then explores the explanatory advantages and disadvantages of the two approaches in relation to each of these elements as well as to ownership of personal data in IoT at large. Lastly, the article outlines a revised approach to ownership of personal data in IoT that may serve as a blueprint for future work in this area and inform regulatory and policy debates.


2014 ◽  
Vol 998-999 ◽  
pp. 1374-1377
Author(s):  
Da Hui Li

This article introduces the services and development of the Internet of Things, and analyzes the driving forces and obstacles behind such development. Looking at application types and the different development stages of the Internet of Things, this article categorizes its services into four types: identity related services, information aggregation services, collaborative-aware services, and ubiquitous services. For the first two types of services, applications and system framework are discussed; for the last two types, development trends are discussed. Services provided by the Internet of Things will gradually be integrated into human life and society; with the development of the Internet of Things, applications will evolve from relatively simple identity-related and information aggregation-related applications, to collaboratively-aware and finally ubiquitous applications. It will then be possible for the Internet of Things to be fully integrated with Internet and telecommunications networks


Author(s):  
Varsha Sharma ◽  
Vivek Sharma ◽  
Nishchol Mishra

Recently, Internet of Things (IoT) has aroused great interest among the educational, scientific research, and industrial communities. Researchers affirm that IoT environments will make people's daily life easier and will lead to superior services, great savings as well as a nifty use of resources. Consequently, IoT merchandise and services will grow exponentially in the upcoming years. The basic idea of IoT is to connect physical objects to the Internet and use that connection to provide some kind of useful remote monitoring or control of those objects. The chapter presents the overall IoT vision, the technologies for achieving it, IoT challenges and its applications. This chapter also attempts to describe and analyze threat types for privacy, security and trust in IoT as well as shows how big data is an important factor in IoT. This chapter will expose the readers and researchers who are interested in exploring and implementing the IoT and related technologies to the progress towards the bright future of the Internet of Things


2022 ◽  
pp. 51-68
Author(s):  
Vijay Prakash ◽  
Lalit Garg ◽  
Luke Camilleri ◽  
Joseph Curmi ◽  
Darren Camilleri

5G is a new universal wireless standard, a new form of mobile network engineered to bring everyone and everything virtually together. 5G is not only for mobile phones, but it is also the foundation for virtual reality (VR), the internet of things (IoT), and autonomous driving, connecting many electronic devices to the internet. Having good healthcare is very important as it affects all parts of human life and social well-being. Moreover, it is crucial to have a great healthcare system if we want economic growth, workforce productivity, and society to advance. Despite all the hard work done by scientists and medical professionals, today's healthcare is mainly inefficient, and a significant overhaul is required. This chapter discusses the primary advantages, including the 5G's main features in healthcare and their limitations and probable solutions and applications to the latest scenario.


2013 ◽  
Vol 753-755 ◽  
pp. 2841-2844
Author(s):  
Ke Wang Huang

The paper focuses on design of the internet of things storage mailbox system. The system uses RFID technology and compatible one-dimensional barcode to shield the personal information of the sender and the recipient. It manages the authentication of the user, the parcel, the courier and the storage mailbox remotely. And sending and receiving the parcel is not face-to-face handover. The system monitors the process of sending and receiving so as to ensure that the parcel will be sent to the recipient accurately and efficiently. The use of the system will avoid malicious parcel and waste parcel appearing.


Author(s):  
Yuliia Pyrih ◽  
Mykola Kaidan ◽  
Olena Hordiichuk-Bublivska

The paper considers the concept of "Internet of Things", which is increasingly penetrating into various spheres of human life and contributes to a significant qualitative change in economic, operational and technological processes. The stages of functioning of the Internet of Things and the levels of its architecture are considered. Based on an analysis of a number of literature sources, the IoT has the greatest impact on six industries such as electricity and housing, health, agriculture and livestock, freight transportation and storage, smart city and construction, and manufacturing. A description of the main types of services for each of these industries and the role of the Internet of Things for its development. It is determined that the application of IoT solutions: in energy - allows to reduce the cost of infrastructure operation, prevent serious accidents and increase the efficiency of asset use; in healthcare - provides real-time streaming of data from devices that monitor the human condition, which allows for accurate diagnosis, increase the accuracy of results and optimize the provision of medical care; in agriculture and livestock - allows to significantly increase the efficiency of cultivation and reduce losses of agricultural products by raising awareness in decision-making and the ability to respond quickly to changes in weather, prices, market situation, etc .; for transportation and storage of goods - allows to provide smooth movement of operations and reduction of underutilization of resources for profit maximization; for "smart city" and construction - allows you to fundamentally improve the city's economy, improve living standards and public safety through more efficient management of housing and communal services, transport and services for the population; for industrial production - allows you to optimize production processes, modify business models, as well as increase productivity and efficiency, while reducing costs. The scheme of intelligent transport system for the city of Kyiv is presented.


Author(s):  
Linh Manh Pham

Many domains of human life are more and moreimpacted by applications of the Internet of Things (i.e., IoT).The embedded devices produce masses of data day after dayrequiring a strong network infrastructure. The inclusion ofmessaging protocols like MQTT is important to ensure as fewerrors as possible in sending millions of IoT messages. Thisprotocol is a great component of the IoT universe due to itslightweight design and low power consumption. DistributedMQTT systems are typically needed in actual applicationenvironments because centralized MQTT methods cannotaccommodate a massive volume of data. Although beingscalable decentralized MQTT systems, they are not suited totraffic workload variability. IoT service providers may incurexpense because the computing resources are overestimated.This points to the need for a new approach to adapt workloadfluctuation. Through proposing a modular MQTT framework,this article provides such an elasticity approach. In order toguarantee elasticity of MQTT server cluster while maintainingintact IoT implementation, the MQTT framework used offthe-shelf components. The elasticity feature of our frameworkis verified by various experiments.


Due to the technology of IOT the human daily life services were became easier. With this technology the scalability will become very more to handle this kind of networks 6LOWPAN protocol was used, In this 6LOWPAn networks the RPL protocol was used to route the packets. The RPL protocol is constrain protocol particularly suits for the constrain node. Due to this constrain behavior this protocol may leads to many attacks. The attacks may be a black hole, wormhole, sinkhole etc. This paper was focused on Black hole attack. The black hole attack was simulated in the Contiki cooja simulator and proposed an detection approach based on the threshold value of each node in the network, to this black hole attack and the results was generated by using the contiki cooja simulator the results shows the effectiveness of the proposed technique in terms of the packet delivery rate, detection rate of attack.


Sign in / Sign up

Export Citation Format

Share Document