The Acceptance Process of the Internet of Things

Author(s):  
Elodie Attié ◽  
Lars Meyer-Waarden

The internet of things, or the IoT, is progressively and surely invading environments, and is consequently creating new kinds of consumer needs and behaviors. More and more companies are getting involved in this growing field, showing the importance for them to understand this technology market. This chapter aims at studying the acceptance process of the IoT. More specifically, the main factors that influence consumer decisions to accept and use the IoT and smart objects have been tested, such as the ethical, wellbeing, social, and utility values. The importance of each benefit is demonstrated, according to specific targets and to examples of applications. A system of values that represents the promises of the IoT and the central needs of users is also described. Besides, a typology of users should help companies creating or refining targeting strategies and should guide consumers into their acceptance process. Finally, further research directions are discussed.

Technologies ◽  
2021 ◽  
Vol 9 (1) ◽  
pp. 22
Author(s):  
Eljona Zanaj ◽  
Giuseppe Caso ◽  
Luca De Nardis ◽  
Alireza Mohammadpour ◽  
Özgü Alay ◽  
...  

In the last years, the Internet of Things (IoT) has emerged as a key application context in the design and evolution of technologies in the transition toward a 5G ecosystem. More and more IoT technologies have entered the market and represent important enablers in the deployment of networks of interconnected devices. As network and spatial device densities grow, energy efficiency and consumption are becoming an important aspect in analyzing the performance and suitability of different technologies. In this framework, this survey presents an extensive review of IoT technologies, including both Low-Power Short-Area Networks (LPSANs) and Low-Power Wide-Area Networks (LPWANs), from the perspective of energy efficiency and power consumption. Existing consumption models and energy efficiency mechanisms are categorized, analyzed and discussed, in order to highlight the main trends proposed in literature and standards toward achieving energy-efficient IoT networks. Current limitations and open challenges are also discussed, aiming at highlighting new possible research directions.


2020 ◽  
Vol 7 (1) ◽  
pp. 22-28
Author(s):  
Vladimir Eliseev ◽  
Anastasiya Gurina

  Abstract— The paper investigates the causes of widespread use by cybercriminals of the Internet of Things for organizing network attacks and other illegal use. An analysis of existing approaches and technologies for protecting networked computer devices is presented, as well as the main factors that prevent their use in the world of Internet of Things. An approach is suggested that ensures the integration of protective mechanisms directly into the composition of Things. Various variants of technology implementation are considered. Key aspects and potential ways of implementing the proposed approach are noted.Tóm tắt— Bài báo nghiên cứu về các phương thức được tội phạm mạng sử dụng rộng rãi trong Internet vạn vật (IoT), để tổ chức các tấn công mạng và các hành vi bất hợp pháp khác. Bài báo phân tích các phương pháp và công nghệ hiện có để bảo vệ các thiết bị kết nối mạng, cũng như các yếu tố chính để ngăn chặn việc sử dụng chúng trong IoT. Cách tiếp cận được đề xuất là đảm bảo việc tích hợp các cơ chế bảo vệ trực tiếp vào cấu trúc của IoT. Bài báo cũng xem xét các biến thể khác của việc thực hiện công nghệ này. Từ đó, đưa ra lưu ý về các khía cạnh chính và cách thức cài đặt tiềm năng để thực hiện phương pháp được đề xuất. 


Author(s):  
Laura Belli ◽  
Simone Cirani ◽  
Luca Davoli ◽  
Gianluigi Ferrari ◽  
Lorenzo Melegari ◽  
...  

The Internet of Things (IoT) will consist of billions (50 billions by 2020) of interconnected heterogeneous devices denoted as “Smart Objects:” tiny, constrained devices which are going to be pervasively deployed in several contexts. To meet low-latency requirements, IoT applications must rely on specific architectures designed to handle the gigantic stream of data coming from Smart Objects. This paper propose a novel Cloud architecture for Big Stream applications that can efficiently handle data coming from Smart Objects through a Graph-based processing platform and deliver processed data to consumer applications with low latency. The authors reverse the traditional “Big Data” paradigm, where real-time constraints are not considered, and introduce the new “Big Stream” paradigm, which better fits IoT scenarios. The paper provides a performance evaluation of a practical open-source implementation of the proposed architecture. Other practical aspects, such as security considerations, and possible business oriented exploitation plans are presented.


Symmetry ◽  
2018 ◽  
Vol 10 (12) ◽  
pp. 669 ◽  
Author(s):  
Daniel Díaz López ◽  
María Blanco Uribe ◽  
Claudia Santiago Cely ◽  
Daniel Tarquino Murgueitio ◽  
Edwin Garcia Garcia ◽  
...  

Undoubtedly, the adoption of the Internet of Things (IoT) paradigm has impacted on our every-day life, surrounding us with smart objects. Thus, the potentialities of this new market attracted the industry, so that many enterprises developed their own IoT platforms aiming at helping IoT services’ developers. In the multitude of possible platforms, selecting the most suitable to implement a specific service is not straightforward, especially from a security perspective. This paper analyzes some of the most prominent proposals in the IoT platforms market-place, performing an in-depth security comparison using five common criteria. These criteria are detailed in sub-criteria, so that they can be used as a baseline for the development of a secure IoT service. Leveraging the knowledge gathered from our in-depth study, both researchers and developers may select the IoT platform which best fits their needs. Additionally, an IoT service for monitoring commercial flights is implemented in two previously analyzed IoT platforms, giving an adequate detail level to represent a solid guideline for future IoT developers.


Sensors ◽  
2017 ◽  
Vol 17 (5) ◽  
pp. 1001 ◽  
Author(s):  
Kuo-Hui Yeh ◽  
Chunhua Su ◽  
Kim-Kwang Raymond Choo ◽  
Wayne Chiu

Sign in / Sign up

Export Citation Format

Share Document