scholarly journals 25 Years of Bluetooth Technology

2019 ◽  
Vol 11 (9) ◽  
pp. 194 ◽  
Author(s):  
Sherali Zeadally ◽  
Farhan Siddiqui ◽  
Zubair Baig

Bluetooth technology started off as a wireless, short-range cable replacement technology but it has undergone significant developments over the last two decades. Bluetooth radios are currently embedded in almost all computing devices including personal computers, smart phones, smart watches, and even micro-controllers. For many of us, Bluetooth is an essential technology that we use every day. We provide an insight into the history of Bluetooth and its significant design developments over the last 25 years. We also discuss related issues (including security) and Bluetooth as a driving technology for the Internet of Things (IoT). Finally, we also present recent research results obtained with Bluetooth technology in various application areas.

Author(s):  
Ali Osman Serdar Citak

The history of the development of the Internet of Things (IoT) covers the last twenty years. Despite the short of time, the concept and implementation of the Internet of Things have widely spread all over the world. The impetus of the dissemination of the concept has exponential speed. In the near future, billions of smart sensors and devices will interact with one another without human intervention. The early impact of the Internet of Things has been observed and discussed in the areas of technology, transportation, production, and marketing. The prospective effect of the Internet of Things on the finance sector has been discussed recently. In this study, the development of the concept of the Internet of Things and it is effect on the finance sector and specifically the insurance and banking sectors and future expectations have been evaluated.


2019 ◽  
Vol 265 ◽  
pp. 07014
Author(s):  
Alexander Shiler ◽  
Elizaveta Stepanova

At present, the Internet market of things is constantly expanding; it has covered almost all the most important areas: transport, housing and communal services, industry, agriculture, telecommunications and information technology. In connection with the constant increase in the number of attacks on IoT-devices, the issue of standardization of this technology is quite acute. The features of the of existing solutions and the new proposed Russian NB-Fi standard for IoT are presented in this article from the point of view of information security.


Author(s):  
Kate Carruthers

In many ways the Internet of Things will change everything, as devices and software mesh and become part of the connected fabric of the Internet. This article explores the context and potential offered by the growth of the Internet of Things (IoT). It provides an overview of this next phase of the digital revolution that is underpinned by the growth of the social web, web 2.0, and the convergence of technologies such as mobile and ubiquitous broadband. This article also attempts to provide some insight into the potential value of the Internet of Things market in the future. The opportunities offered by the Internet of Things also raise serious questions about privacy and security in a connected world. As Umair Haque noted recently: “At some point, we should all question the value of an internet that objectifies you, tracks you, and polices you...without your consent.” (Haque 2014)


Author(s):  
Praveen Pandey

Abstract: Cyber security are techniques generally set forth in published materials that attempt to safeguard the cyber environment of a user or organization. It manages the set of techniques used to save the integrity of networks, programs and data from unauthorized access. It refers to the body of technologies, processes, and it may also be referred to as information technology security. The field is of growing importance due to increasing reliance on computer systems, including smart phones, televisions and the various tiny devices that constitute the Internet of Things. Keywords: IT security, Internet of things (IOT)


2019 ◽  
Vol 8 (3) ◽  
pp. 19-22
Author(s):  
K. Sailaja ◽  
M. Rohitha

Security is a million dollar issue for all computer systems. Every week there is news of another major breakin to a commercial or government system. Also it is well known that many governments are actively engaged in cyber-warfare, trying to break into the systems of other governments and other groups. The Internet of Things is increasingly changing into an omnipresent computing service, requiring vast volumes of knowledge storage and process. Unfortunately, due to the unique characteristics of resource constraints, self-organization and short range communication in IoT, it always resorts to the cloud for outsourced storage and computation. Security is one of the major challenges faced by cloud based IoT. The standard file protection technique relies on password based encryption schemes and they are vulnerable to brute force attacks. The reason is that, for a wrongly guessed key, the decryption process yields an invalid-looking plaintext message, confirming the invalidity of the key, while for the correct key it outputs a valid-looking plaintext message, confirming the correctness of the guessed key. Honey encryption helps to minimise this vulnerability. Hence, this paper proposed an extended Honey Encryption (XHE) scheme for enhancing the security of the cloud based IoT.


Author(s):  
Dimitris K. Kardaras ◽  
Bill Karakostas ◽  
Stavroula G. Barbounaki ◽  
Stavros Kaperonis

The proliferation of the internet of things will open up new opportunities for implementing the digital transformation of businesses. Available data is expected to rise in unprecedented levels of quantity with the IoT playing an important role towards that end. Data analytics techniques will provide businesses with refined pieces of information in almost all aspects in both B2C and B2B context, thus refining services design and customization with more flexibility and options that focus right at the heart of consumers' needs. Digital marketing depends on these developments. This chapter aims at proposing a framework for analyzing the implications of data analytics and IoT on digital marketing.


Smart Cities ◽  
2018 ◽  
Vol 1 (1) ◽  
pp. 98-120 ◽  
Author(s):  
Spyros Tzafestas

The aim of the law is to maintain social order, peace, and justice in society, whereas the aim of ethics is to provide codes of ethics and conduct that help people to decide what is wrong, and how to act and behave. Laws provide a minimum set of standards for obtaining good human behavior. Ethics often provides standards that exceed the legal minimum. Therefore, for the best behavior, both law and ethics should be respected. The Internet of Things (IoT) involves a large number of objects and humans that are connected via the Internet ‘anytime’ and ‘anyplace’ to provide homogeneous communication and contextual services. Thus, it creates a new social, economic, political, and ethical landscape that needs new enhanced legal and ethical measures for privacy protection, data security, ownership protection, trust improvement, and the development of proper standards. This survey and opinion article is concerned with the ethics and legislation of the IoT and provides an overview of the following: definition and history of the IoT; general ethical principles and theories that are available for application in the IoT; the role of governments in the IoT; regulations in the European Union (EU) and United States for the IoT’ IoT characteristics that have the potential to create ethical problems; IoT ethical questions and principles; IoT security, privacy, and trust aspects; and the ethical culture of IoT-related companies.


2015 ◽  
pp. 20-27
Author(s):  
T. E. Savitskaya

Internet of Things: Experience of a Culturological Analysis (by Tatyana Savitskaya) studies the cultural meaning of the Internet of Things as an ascending trend in the development of information technologies. The focus is on the history of interaction between a man and a thing, both in the consumer society and in the modern electronic civilization. The article reviews some social and anthropological effects of the mass use of new cultural practices oriented towards the Internet of Things


Author(s):  
Leonid Reingold ◽  
Aleksandr Solovev ◽  
Elena Reingold

Dramatical changes in society’s infrastructure require new conceptual approaches towards the research of socioeconomic phenomena. Nowadays, environment surrounding people experience qualitative changes; it has become possible to use full information on the history of objects. It is essential to develop a conceptual framework enabling to thoroughly describe the interaction of an individual and a socioeconomic environment that is changed by digital technologies. In this article, it is suggested to use the concept of socioeconomic technology in the context of exploration of digitalization processes. These include the Internet of things, big data processing, widespread implementation of personal tools to process and share information etc. The concept of socioeconomic technology allows tying up new technologies with the needs of an individual and society as well as with phenomena emerging in socioeconomic infrastructure. The suggested approach may be used at the development and implementation of the Internet of things, of global communication infrastructure, of technologies for processing and storage of data, and for the research of other aspects of society’s digitalization. Today it is possible to research different directions for the development of consumption sphere and technologies taking into account the emergence of virtual properties of objects. Virtual properties result for example in multiple ways to implement things, in the possibility to store and use the full history of major objects surrounding an individual. Conceptual framework suggested in this article allows holistically addressing the issues of commercial efficiency and socioeconomic management in the age of digitalization.


Sign in / Sign up

Export Citation Format

Share Document