scholarly journals The Emergence of Internet of Things (IoT): Connecting Anything, Anywhere

Computers ◽  
2019 ◽  
Vol 8 (2) ◽  
pp. 40 ◽  
Author(s):  
Md Arafatur Rahman ◽  
A. Taufiq Asyhari

Internet of Things (IoT) plays the role of an expert’s technical tool by empowering physical resources into smart entities through existing network infrastructures. Its prime focus is to provide smart and seamless services at the user end without any interruption. The IoT paradigm is aimed at formulating a complex information system with the combination of sensor data acquisition, efficient data exchange through networking, machine learning, artificial intelligence, big data, and clouds. Conversely, collecting information and maintaining the confidentiality of an independent entity, and then running together with privacy and security provision in IoT is the main concerning issue. Thus, new challenges of using and advancing existing technologies, such as new applications and using policies, cloud computing, smart vehicular system, protective protocols, analytics tools for IoT-generated data, communication protocols, etc., deserve further investigation. This Special Issue reviews the latest contributions of IoT application frameworks and the advancement of their supporting technology. It is extremely imperative for academic and industrial stakeholders to propagate solutions that can leverage the opportunities and minimize the challenges in terms of using this state-of-the-art technological development.

Author(s):  
Omar Subhi Aldabbas

Internet of Things (IoT) is a ubiquitous embedded ecosystem known for its capability to perform common application functions through coordinating resources, which are distributed on-object or on-network domains. As new applications evolve, the challenge is in the analysis and usage of multimodal data streamed by diverse kinds of sensors. This paper presents a new service-centric approach for data collection and retrieval. This approach considers objects as highly decentralized, composite and cost effective services. Such services can be constructed from objects located within close geographical proximity to retrieve spatio-temporal events from the gathered sensor data. To achieve this, we advocate Coordination languages and models to fuse multimodal, heterogeneous services through interfacing with every service to achieve the network objective according to the data they gather and analyze. In this paper we give an application scenario that illustrates the implementation of the coordination models to provision successful collaboration among IoT objects to retrieve information. The proposed solution reduced the communication delay before service composition by up to 43% and improved the target detection accuracy by up to 70%, while maintaining energy consumption 20% lower than its best rivals in the literature.


2020 ◽  
Vol 9 (1) ◽  
pp. 1661-1666

The Internet has become the most important medium for information exchange and the core communication environment for business relations as well as for social interactions. The current internet architecture itself might become the limiting factor of Internet growth and deployment of new applications including 5G and future internet. Architectural limitations of internet include weak security, lack of efficient storage and caching, data distribution and traceability issues, lack of interoperability and so on. The proposed system overcomes these limitations by an alternate architecture for internet called NovaGenesis. This architecture integrates the concepts of Information Centric Networking (ICN), Service Oriented Architecture (SOA), network caching and name based routing. ICN evolve internet from a host-centric model to a content-centric model through efficient data exchange, storage and processing. SOA enables software-control/management of network devices based on service requirements. Network caching improves performance in terms of throughput, network traffic and retrieval delay. Name based routing is for discovering and delivering of data. The framework proposed increases the scalability and reliability of the delivery of IoT data for services.


Symmetry ◽  
2019 ◽  
Vol 11 (2) ◽  
pp. 244 ◽  
Author(s):  
Jong Park

After the emergence of the Internet and mobile communication networks, the IoT has been considered as the third wave of information technology. The Industrial Internet of Things (IIoT) is the use of Internet of Things (IoT) technologies in manufacturing. IIoT incorporates machine learning and big data technology, sensor data, and machine-to-machine (M2M) communications that have existed in industrial areas for years. In the future, people and objects will be connected at any time, any place, with anything and anyone and will utilize any network and services. IIoT is creating a new world in which people and businesses can manage their assets in more informed ways and can make more opportune and better-informed decisions. Many advanced IIoT and 5G technologies have been successfully applied in everyday life, but there are still many practical problems tackled by traditional methods which are generally difficult to experimentally solve in the advanced Industrial Internet of Things. Therefore, in this special issue, we accepted five articles in three different dimensions: communication networks, optimized resource provisioning and data forwarding, privacy and security.


2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Y.P. Tsang ◽  
C.H. Wu ◽  
W.H. Ip ◽  
Wen-Lung Shiau

PurposeDue to the rapid growth of blockchain technology in recent years, the fusion of blockchain and the Internet of Things (BIoT) has drawn considerable attention from researchers and industrial practitioners and is regarded as a future trend in technological development. Although several authors have conducted literature reviews on the topic, none have examined the development of the knowledge structure of BIoT, resulting in scattered research and development (R&D) efforts.Design/methodology/approachThis study investigates the intellectual core of BIoT through a co-citation proximity analysis–based systematic review (CPASR) of the correlations between 44 highly influential articles out of 473 relevant research studies. Subsequently, we apply a series of statistical analyses, including exploratory factor analysis (EFA), hierarchical cluster analysis (HCA), k-means clustering (KMC) and multidimensional scaling (MDS) to establish the intellectual core.FindingsOur findings indicate that there are nine categories in the intellectual core of BIoT: (1) data privacy and security for BIoT systems, (2) models and applications of BIoT, (3) system security theories for BIoT, (4) frameworks for BIoT deployment, (5) the fusion of BIoT with emerging methods and technologies, (6) applied security strategies for using blockchain with the IoT, (7) the design and development of industrial BIoT, (8) establishing trust through BIoT and (9) the BIoT ecosystem.Originality/valueWe use the CPASR method to examine the intellectual core of BIoT, which is an under-researched and topical area. The paper also provides a structural framework for investigating BIoT research that may be applicable to other knowledge domains.


2021 ◽  
Vol 13 (12) ◽  
pp. 312
Author(s):  
Pranav Gangwani ◽  
Alexander Perez-Pons ◽  
Tushar Bhardwaj ◽  
Himanshu Upadhyay ◽  
Santosh Joshi ◽  
...  

The demand for the digital monitoring of environmental ecosystems is high and growing rapidly as a means of protecting the public and managing the environment. However, before data, algorithms, and models can be mobilized at scale, there are considerable concerns associated with privacy and security that can negatively affect the adoption of technology within this domain. In this paper, we propose the advancement of electronic environmental monitoring through the capability provided by the blockchain. The blockchain’s use of a distributed ledger as its underlying infrastructure is an attractive approach to counter these privacy and security issues, although its performance and ability to manage sensor data must be assessed. We focus on a new distributed ledger technology for the IoT, called IOTA, that is based on a directed acyclic graph. IOTA overcomes the current limitations of the blockchain and offers a data communication protocol called masked authenticated messaging for secure data sharing among Internet of Things (IoT) devices. We show how the application layer employing the data communication protocol, MAM, can support the secure transmission, storage, and retrieval of encrypted environmental sensor data by using an immutable distributed ledger such as that shown in IOTA. Finally, we evaluate, compare, and analyze the performance of the MAM protocol against a non-protocol approach.


2014 ◽  
Vol 548-549 ◽  
pp. 1438-1444 ◽  
Author(s):  
Hui Zhe Wang ◽  
Guo Wen Lin ◽  
Jian Qin Wang ◽  
Wan Lin Gao ◽  
Yi Fei Chen ◽  
...  

Internet of Things (IoT) is playing a more and more important role in modern agriculture development. However, problems of efficient storing and reasoning those massive heterogeneous sensor data collected from variety kinds of sensing equipment need to be resolved to implement Internet of Things in agriculture. This paper explores the architecture of Internet of Things in agriculture with heterogeneous sensor data, and proposes a design of implementation to Internet of Things in agriculture based on cloud computing. The design is based on two-tier storage structure of HBase, which is a distributed database with high scalability. It access database using MapReduce model, a distributed programming framework. Hence, this design provides scalable storage, efficient data access, and eases other processing of sensor data.


Author(s):  
Dr. S V Viraktamath

Abstract: The IoT (Internet of Things) is one of the leading and advantageous technologies in the 21st century, which can give the high level implementation feasibility in the field of wireless telecommunications. The IoT can also be defined as a smart and interconnected network in a highly dynamic infrastructure. It also provides the feature of from anywhere at any time. The main aim of internet of things is to create a huge and complex information system by combining various trending technologies like sensor data, Artificial Intelligence, Machine Learning, Data science, Networking, big data and Clouds. The biggest deal in IoT is to collect the huge data and data security in maintaining the data confidentiality and providing the privacy for every entity. As a result of all these aspects, new difficulties are entering in improving and implementing the current technologies. There are many such technologies by which many more difficulties are entering. They all must be investigated further. This is a special issue which examines the most recent contributions of IoT platform as well as in the progress of the trending technologies. A statement from IoT is that, monitor and control any technology from anywhere, anytime, wireless, fastest. Keyword: Wireless, IoT, Machine learning, Cloud.


Electronics ◽  
2019 ◽  
Vol 8 (7) ◽  
pp. 768 ◽  
Author(s):  
L. Minh Dang ◽  
Md. Jalil Piran ◽  
Dongil Han ◽  
Kyungbok Min ◽  
Hyeonjoon Moon

The fast development of the Internet of Things (IoT) technology in recent years has supported connections of numerous smart things along with sensors and established seamless data exchange between them, so it leads to a stringy requirement for data analysis and data storage platform such as cloud computing and fog computing. Healthcare is one of the application domains in IoT that draws enormous interest from industry, the research community, and the public sector. The development of IoT and cloud computing is improving patient safety, staff satisfaction, and operational efficiency in the medical industry. This survey is conducted to analyze the latest IoT components, applications, and market trends of IoT in healthcare, as well as study current development in IoT and cloud computing-based healthcare applications since 2015. We also consider how promising technologies such as cloud computing, ambient assisted living, big data, and wearables are being applied in the healthcare industry and discover various IoT, e-health regulations and policies worldwide to determine how they assist the sustainable development of IoT and cloud computing in the healthcare industry. Moreover, an in-depth review of IoT privacy and security issues, including potential threats, attack types, and security setups from a healthcare viewpoint is conducted. Finally, this paper analyzes previous well-known security models to deal with security risks and provides trends, highlighted opportunities, and challenges for the IoT-based healthcare future development.


Sensors ◽  
2021 ◽  
Vol 21 (13) ◽  
pp. 4354
Author(s):  
Mohd Majid Akhtar ◽  
Danish Raza Rizvi ◽  
Mohd Abdul Ahad ◽  
Salil S. Kanhere ◽  
Mohammad Amjad ◽  
...  

A potential rise in interest in the Internet of Things in the upcoming years is expected in the fields of healthcare, supply chain, logistics, industries, smart cities, smart homes, cyber physical systems, etc. This paper discloses the fusion of the Internet of Things (IoT) with the so-called “distributed ledger technology” (DLT). IoT sensors like temperature sensors, motion sensors, GPS or connected devices convey the activity of the environment. Sensor information acquired by such IoT devices are then stored in a blockchain. Data on a blockchain remains immutable however its scalability still remains a challenging issue and thus represents a hindrance for its mass adoption in the IoT. Here a communication system based on IOTA and DLT is discussed with a systematic architecture for IoT devices and a future machine-to-machine (M2M) economy. The data communication between IoT devices is analyzed using multiple use cases such as sending DHT-11 sensor data to the IOTA tangle. The value communication is analyzed using a novel “micro-payment enabled over the top” (MP-OTT) streaming platform that is based on the “pay-as-you-go” and “consumption based” models to showcase IOTA value transactions. In this paper, we propose an enhancement to the classical “masked authenticated message” (MAM) communication protocol and two architectures called dual signature masked authenticated message (DSMAM) and index-based address value transaction (IBAVT). Further, we provided an empirical analysis and discussion of the proposed techniques. The implemented solution provides better address management with secured sharing and communication of IoT data, complete access control over the ownership of data and high scalability in terms of number of transactions that can be handled.


Sign in / Sign up

Export Citation Format

Share Document