scholarly journals Internet of Things for Smart Community Solutions

Sensors ◽  
2022 ◽  
Vol 22 (2) ◽  
pp. 640
Author(s):  
Dhananjay Singh ◽  
Mario Divan ◽  
Madhusudan Singh

The term IoT (Internet of Things) constitutes the quickly developing advanced gadgets with highest computing power with in a constrained VLSI design space [...]

IEEE Access ◽  
2018 ◽  
Vol 6 ◽  
pp. 28019-28027 ◽  
Author(s):  
Dong Zheng ◽  
Axin Wu ◽  
Yinghui Zhang ◽  
Qinglan Zhao

Author(s):  
N. Raghavendra Rao

Information technology has advanced by delivering an exponential increase in computing power. Telecommunication technology has likewise advanced communicating capabilities. Convergence of these two technologies has become possible due to the rapid advancements made in the respective technology. This convergence is termed as information and communication technology as a discipline. Many concepts are emerging in this discipline. These concepts enable business, government, and human beings to reach new realities in their required activities. Some of these concepts have created various opportunities for designing and manufacturing electronic devices. When these devices are connected to other devices and systems over the internet, this is now known as internet of things (IoT). This chapter gives a brief overview of the concepts such as cloud computing and ubiquitous and pervasive computing in the context of internet of things. Further, this chapter discusses five case illustrations with the relevance of internet of things.


Sensors ◽  
2019 ◽  
Vol 20 (1) ◽  
pp. 207 ◽  
Author(s):  
Yongjun Ren ◽  
Fujian Zhu ◽  
Pradip Kumar Sharma ◽  
Tian Wang ◽  
Jin Wang ◽  
...  

In the IoT (Internet of Things) environment, smart homes, smart grids, and telematics constantly generate data with complex attributes. These data have low heterogeneity and poor interoperability, which brings difficulties to data management and value mining. The promising combination of blockchain and the Internet of things as BCoT (blockchain of things) can solve these problems. This paper introduces an innovative method DCOMB (dual combination Bloom filter) to firstly convert the computational power of bitcoin mining into the computational power of query. Furthermore, this article uses the DCOMB method to build blockchain-based IoT data query model. DCOMB can implement queries only through mining hash calculation. This model combines the data stream of the IoT with the timestamp of the blockchain, improving the interoperability of data and the versatility of the IoT database system. The experiment results show that the random reading performance of DCOMB query is higher than that of COMB (combination Bloom filter), and the error rate of DCOMB is lower. Meanwhile, both DCOMB and COMB query performance are better than MySQL (My Structured Query Language).


2020 ◽  
Author(s):  
Shamim Muhammad ◽  
Inderveer Chana ◽  
Supriya Thilakanathan

Edge computing is a technology that allows resources to be processed or executed close to the edge of the internet. The interconnected network of devices in the Internet of Things has led to an increased amount of data, increasing internet traffic usage every year. Also, edge computing is driving applications and computing power away from the integrated points to areas close to users, leading to improved performance of the application. Despite the explosive growth of the edge computing paradigm, there are common security vulnerabilities associated with the Internet of Things applications. This paper will evaluate and analyze some of the most common security issues that pose a serious threat to the edge computing paradigm.


2021 ◽  
Vol 2021 ◽  
pp. 1-11
Author(s):  
Gaopan Hou ◽  
Jianfeng Ma ◽  
Jiayi Li ◽  
Chen Liang

With the increase in network transmission rates, the Internet of Things (IoT) has gradually become a trend. Users can upload the data generated by the device to the cloud database to save local storage space, thereby reducing local storage costs. Because uploading data to the cloud loses physical control of the data, an audit is required. Traditional audit protocols are not completely suitable for lightweight devices in the IoT. This paper proposes a new type of audit protocol suitable for lightweight devices with weak computing power. This protocol transfers part of the computation of data tags to a cloud storage provider (CSP) with strong computing power, thereby reducing the introduction of computing entities. Our scheme supports the dynamic operation of data and guarantees the effectiveness of challenge response by blockchain. Compared with existing schemes, our scheme is more secure and effective.


2020 ◽  
Vol 8 (6) ◽  
pp. 3987-3991

The Information Technology has evolved and we have reached at an era of Internet of Things (IoT). According to International Telecommunication Union’s Global Standards Initiative (GSI), it is the network of all kinds of ‘things’ embedded with electronics, sensors, actuators, software etc. Things connected in open Internet poses high security risks. Majority of these devices use Message Queuing Telemetry Transport (MQTT) protocol for exchanging information. Most of the devices with limited storage and computing power are connected using MQTT. Since the protocol doesn't provide any mechanism for encryption, the security aspect of the protocol is really weak. This paper describes the need for empowering security in MQTT. In this research work, we benchmark different cryptographic algorithms and propose the best possible algorithm to enable higher level of security in MQTT. This work further demonstrates how to use the proposed algorithm to enable lightweight key exchange mechanism among MQTT devices.


2021 ◽  
Vol 252 ◽  
pp. 01007
Author(s):  
Feng Zhai ◽  
Yingjie Zhao ◽  
Lingda Kong ◽  
Xiaojuan Zhang ◽  
Lin Jiang

The development of Power Internet of Things has brought a variety of access requirements for massive collecting terminals. Based on the characteristics of security attributes of Power Internet of Things, this paper proposes a secure access protocol based on symmetric cryptographic algorithm for the large number of collecting terminals with limited manufacturing cost, computing power and storage resources. This protocol only uses the symmetric cryptographic algorithm which has the fast computing speed and low resource consumption, and the protocol can realize two-way identity authentication between the collecting terminal and master station. At the same time, combined with the historical access mechanism, it improves the access efficiency of the collecting terminals, and realizes the safe and fast access of the collecting terminal. Finally, compared with other protocols, the proposed protocol is also effective in security and performance.


2021 ◽  
Author(s):  
O. Vishali Priya ◽  
R. Sudha

In today’s world, technology is constantly evolving; various instruments and techniques are available in the agricultural field. And within the agrarian division, the IoT preferences are Knowledge processing. With the help of introduced sensors, all information can be gathered. The reduction of risks, the mechanization of industry, the enhancement of production, the inspection of livestock, the monitoring of environment conditions, the roboticization of greenhouses, and crop monitoring Nearly every sector, like smart agriculture, has been modified by Internet-of-Things (IoT)-based technology, which has shifted the industry from factual to quantitative approaches. The ideas help to link real devices that are equipped with sensors, actuators, and computing power, allowing them to collaborate on a task while staying connected to the Internet, dubbed the “Internet of Things” (IoT). According to the World Telecommunication Union’s Worldwide Guidelines Operation, the Internet of Things (IoT) is a set of sensors, computers, software, and other devices that are connected to the Internet. The paper is highly susceptible to the consequences of its smart agriculture breakthrough.


2012 ◽  
Vol 6-7 ◽  
pp. 900-906
Author(s):  
Shun Bing Zhu ◽  
Chun Quan Du ◽  
Miao Miao Niu

Application of Internet of Things (IOT) in smart home is the direction of the development and promotion of networking industry. This article first proposes smart home system architecture , based on the analysis of typical services provided by home network and within the family intelligent devices inside, then the article describes the solutions of IOT smart home and smart community based on the family intelligent terminals and the features and characteristics of the family intelligent terminals. Finally, detailed analysis the key technical issues of IOT Smart Home middleware and application platforms,standard-setting and so on, provides detail content of IOT smart home equipments research and develop and testing and verifying.


2018 ◽  
Vol 7 (2.8) ◽  
pp. 680
Author(s):  
T Pavan Kumar ◽  
B Eswar ◽  
P Ayyappa Reddy ◽  
D Sindhu Bhargavi

Cloud computing has become a new paradigm shift in the IT world because of its revolutionary model of computing. It provides flexibility, scalability, and reliability and decreased operational and support expenses for an organization. The Enterprise edition software’s are very costly and maintaining a separate IT team and maintaining their own servers is very expensive and that’s the reason why most of the companies are opting for Cloud computing over enterprise edition of the software. However, few organization cloud customers are not willing to step to cloud computing up on a big scale because of the safety problems present in cloud computing. One more disadvantage of Cloud is it’s not suitable for another revolutionary technology i.e.IoT(Internet of things)In this paper we are going to present the Advantages of Fog Computing and Decoy technology to address the security in cloud computing by extending it into fog computing.Fog Computing is a new paradigm in which the computing power moves to the edge of the network. So, it’s also called as Edge Computing.


Sign in / Sign up

Export Citation Format

Share Document