scholarly journals Prospective Efficient Ambient Energy Harvesting Sources for IoT-Equipped Sensor Applications

Electronics ◽  
2020 ◽  
Vol 9 (9) ◽  
pp. 1345 ◽  
Author(s):  
Mahmuda Khatun Mishu ◽  
Md. Rokonuzzaman ◽  
Jagadeesh Pasupuleti ◽  
Mohammad Shakeri ◽  
Kazi Sajedur Rahman ◽  
...  

In the past few years, the internet of things (IoT) has garnered a lot of attention owing to its significant deployment for fulfilling the global demand. It has been seen that power-efficient devices such as sensors and IoT play a significant role in our regular lives. However, the popularity of IoT sensors and low-power electronic devices is limited due to the lower lifetime of various energy resources which are needed for powering the sensors over time. For overcoming this issue, it is important to design and develop better, high-performing, and effective energy harvesting systems. In this article, different types of ambient energy harvesting systems which can power IoT-enabled sensors, as well as wireless sensor networks (WSNs), are reviewed. Various energy harvesting models which can increase the sustainability of the energy supply required for IoT devices are also discussed. Furthermore, the challenges which need to be overcome to make IoT-enabled sensors more durable, reliable, energy-efficient, and economical are identified.

Author(s):  
Shakeel Ahmed

Different types of energy which generally fulfill the requirements of computing are mostly from thermal, mechanical, solar, wind, acoustic, and wave. Typically, IoT devices are powered by batteries that have limited lifetime, and thus these IoT devices need to be self-powered or require supportive energy sources that uninterruptedly power IoT devices. Energy harvesting is one of the techniques that can be applied to power these devices, which is a procedure of apprehending energy from lone or more energy from renewable sources in the proximate atmosphere known as environmental energy which can be renovated into usable electrical energy. Numerous researches are being carried out to harvest energy. This chapter is the extended version of the previous work carried out and analyses the present works on the application of IoT in energy harvesting systems and extant different research works carried out by the investigators to classify them.


Energies ◽  
2020 ◽  
Vol 13 (21) ◽  
pp. 5528
Author(s):  
Hassan Elahi ◽  
Khushboo Munir ◽  
Marco Eugeni ◽  
Sofiane Atek ◽  
Paolo Gaudenzi

The internet of things (IoT) manages a large infrastructure of web-enabled smart devices, small devices that use embedded systems, such as processors, sensors, and communication hardware to collect, send, and elaborate on data acquired from their environment. Thus, from a practical point of view, such devices are composed of power-efficient storage, scalable, and lightweight nodes needing power and batteries to operate. From the above reason, it appears clear that energy harvesting plays an important role in increasing the efficiency and lifetime of IoT devices. Moreover, from acquiring energy by the surrounding operational environment, energy harvesting is important to make the IoT device network more sustainable from the environmental point of view. Different state-of-the-art energy harvesters based on mechanical, aeroelastic, wind, solar, radiofrequency, and pyroelectric mechanisms are discussed in this review article. To reduce the power consumption of the batteries, a vital role is played by power management integrated circuits (PMICs), which help to enhance the system’s life span. Moreover, PMICs from different manufacturers that provide power management to IoT devices have been discussed in this paper. Furthermore, the energy harvesting networks can expose themselves to prominent security issues putting the secrecy of the system to risk. These possible attacks are also discussed in this review article.


Sensors ◽  
2020 ◽  
Vol 20 (2) ◽  
pp. 407 ◽  
Author(s):  
Omar A. Saraereh ◽  
Amer Alsaraira ◽  
Imran Khan ◽  
Bong Jun Choi

The Internet-of-things (IoT) has been gradually paving the way for the pervasive connectivity of wireless networks. Due to the ability to connect a number of devices to the Internet, many applications of IoT networks have recently been proposed. Though these applications range from industrial automation to smart homes, healthcare applications are the most critical. Providing reliable connectivity among wearables and other monitoring devices is one of the major tasks of such healthcare networks. The main source of power for such low-powered IoT devices is the batteries, which have a limited lifetime and need to be replaced or recharged periodically. In order to improve their lifecycle, one of the most promising proposals is to harvest energy from the ambient resources in the environment. For this purpose, we designed an energy harvesting protocol that harvests energy from two ambient energy sources, namely radio frequency (RF) at 2.4 GHz and thermal energy. A rectenna is used to harvest RF energy, while the thermoelectric generator (TEG) is employed to harvest human thermal energy. To verify the proposed design, extensive simulations are performed in Green Castalia, which is a framework that is used with the Castalia simulator in OMNeT++. The results show significant improvements in terms of the harvested energy and lifecycle improvement of IoT devices.


Author(s):  
Gabriella Giannachi

This book traces the evolution of the archive across the centuries by looking at primitive, Medieval, Renaissance, Victorian and contemporary archives. Crucially, the book evidences the fluidity and potential inter-changeability between libraries, archives and museums. A number of case studies offer an insight into the operation of a variety of different types of archives, including cabinets of curiosity, archival artforms, architectures, performances, road-shows, time capsules, social media documentation practices, databases, and a variety of museological web-based heritage platforms. The archive is shown to play a crucial role in how individuals and social groups administer themselves through and within a burgeoning social memory apparatus. This is why at the heart of every industrial revolution thus far, the archive continues to contribute to the way we store, preserve and generate knowledge through an accumulation of documents, artifacts, objects, as well as ephemera and even debris. The archive has always been strategic for different types of economies, including the digital economy and the internet of things. Shown here to increasingly affect to the way we map, produce, and share knowledge, the apparatus of the archive, which allows us to continuously renew who we are in relation to the past, so that new futures may become possible, now effectively pervades almost every aspect of our lives.


2020 ◽  
Vol 12 (8) ◽  
pp. 138
Author(s):  
Andrew John Poulter ◽  
Steven J. Ossont ◽  
Simon J. Cox

This paper examines dynamic identity, as it pertains to the Internet of Things (IoT), and explores the practical implementation of a mitigation technique for some of the key weaknesses of a conventional dynamic identity model. This paper explores human-centric and machine-based observer approaches for confirming device identity, permitting automated identity confirmation for deployed systems. It also assesses the advantages of dynamic identity in the context of identity revocation permitting secure change of ownership for IoT devices. The paper explores use-cases for human and machine-based observation for authentication of device identity when devices join a Command and Control(C2) network, and considers the relative merits for these two approaches for different types of system.


2022 ◽  
Vol 18 (1) ◽  
pp. 1-51
Author(s):  
Alberto Giaretta ◽  
Nicola Dragoni ◽  
Fabio Massacci

The Internet of Things (IoT) revolutionised the way devices, and human beings, cooperate and interact. The interconnectivity and mobility brought by IoT devices led to extremely variable networks, as well as unpredictable information flows. In turn, security proved to be a serious issue for the IoT, far more serious than it has been in the past for other technologies. We claim that IoT devices need detailed descriptions of their behaviour to achieve secure default configurations, sufficient security configurability, and self-configurability. In this article, we propose S×C4IoT, a framework that addresses these issues by combining two paradigms: Security by Contract (S×C) and Fog computing. First, we summarise the necessary background such as the basic S×C definitions. Then, we describe how devices interact within S×C4IoT and how our framework manages the dynamic evolution that naturally result from IoT devices life-cycles. Furthermore, we show that S×C4IoT can allow legacy S×C-noncompliant devices to participate with an S×C network, we illustrate two different integration approaches, and we show how they fit into S×C4IoT. Last, we implement the framework as a proof-of-concept. We show the feasibility of S×C4IoT and we run different experiments to evaluate its impact in terms of communication and storage space overhead.


Author(s):  
Basheer Al-Duwairi ◽  
Wafaa Al-Kahla ◽  
Mhd Ammar AlRefai ◽  
Yazid Abedalqader ◽  
Abdullah Rawash ◽  
...  

The Internet of Things (IoT) is becoming an integral part of our daily life including health, environment, homes, military, etc. The enormous growth of IoT in recent years has attracted hackers to take advantage of their computation and communication capabilities to perform different types of attacks. The major concern is that IoT devices have several vulnerabilities that can be easily exploited to form IoT botnets consisting of millions of IoT devices and posing significant threats to Internet security. In this context, DDoS attacks originating from IoT botnets is a major problem in today’s Internet that requires immediate attention. In this paper, we propose a Security Information and Event Management-based IoT botnet DDoS attack detection and mitigation system. This system detects and blocks DDoS attack traffic from compromised IoT devices by monitoring specific packet types including TCP SYN, ICMP and DNS packets originating from these devices. We discuss a prototype implementation of the proposed system and we demonstrate that SIEM based solutions can be configured to accurately identify and block malicious traffic originating from compromised IoT devices.


Tehnika ◽  
2020 ◽  
Vol 75 (6) ◽  
pp. 678-683
Author(s):  
Milica Đekić

The Internet of Things (IoT) is a quite recent paradigm going a decade back to the past. With the development and deployment of wireless technologies this new advancement has taken the part in the consumers' lives and businesses. In other words, the IoT is a pretty convenient way to correlated devices with each other and make them communicate in such a network. This is feasible using the internet connection and differently saying, all IoT devices forming the IoT asset got their IP addresses. From this perspective, it's quite clear that this technology got a lot of advantages and the users may feel so thankful for being the part of an IoT community. On the other hand, the consumers would spend less time thinking about the possible security concerns being linked to this new improvement. In this paper, we intend to discuss how secure our IoT infrastructure is, what its strategic implications are and why cyber industry should invest more time and effort in order to better research and develop this concept. In addition, we would try to deal a bit more with the IoT crawlers as the tools for investigating the IoT network and being so handy for both - researchers and hacker's groups.


Author(s):  
Keyurbhai Arvindbhai Jani ◽  
Nirbhay Chaubey

The Internet of Things (IoT) connects different IoT smart objects around people to make their life easier by connecting them with the internet, which leads IoT environments vulnerable to many attacks. This chapter has few main objectives: to understand basics of IoT; different types of attacks possible in IoT; and prevention steps to secure IoT environment at some extent. Therefore, this chapter is mainly divided into three parts. In first part discusses IoT devices and application of it; the second part is about cyber-attacks possible on IoT environments; and in the third part is discussed prevention and recommendation steps to avoid damage from different attacks.


2019 ◽  
Vol 9 ◽  
pp. 184798041882481 ◽  
Author(s):  
Hoyeong Kwon ◽  
Hamidreza Chalabi ◽  
Andrea Alù

Ways to achieve highly efficient electromagnetic absorption over a broad bandwidth and broad angular spectrum have been discussed extensively in the past decades for various applications, such as low reflection devices and energy harvesting. To satisfy the efficiency requirements, metamaterial approaches have been explored in recent years. In this context, most studies have suggested the use of frequency selective surfaces or arrays of plasmonic resonators, which limit bandwidth and angular spectrum of performance. Here, we explore the application of refractory Brewster metasurfaces for photovoltaic applications. By matching the surface impedance of metasurfaces and free space at the Brewster angle, we show that metasurfaces can lead to efficient light absorption, and their response can be controlled accurately both in the angular and in the frequency spectrum to match the requirements of energy harvesting systems and facilitate large efficiency, high-temperature energy harvesting.


Sign in / Sign up

Export Citation Format

Share Document