Enabling Technologies for IoT

Author(s):  
Rajalakshmi Krishnamurthi ◽  
Mukta Goyal

The internet of things (IoT) is a fast-growing paradigm gaining position in the modern scenario of communication. It targets to provide interconnection among different objects at any time, and anywhere on the earth, under the leverage of internet. IoT has exhibited the promising enhancement in almost all dimensions of the everyday human life scenarios. The IoT applications are smart energy systems, manufacturing services, industrial automation, healthcare, education, smart city, transportation, and security and surveillance. However, there are several issues associated with IoT objectives such as data traffic, security and privacy, data analytics, device localization, and scalability. In addition to this, the IoT objects are resource constrained in terms of memory, computing power, energy, storage, and networking capability. Hence, IoT systems need enabling technologies to overcome these challenges by means of cloud computing, big data, cyber physical systems, and block chain. This chapter discusses how these enabling technologies can be integrated with IoT and its challenges.

The Internet of Things (IoT) is one of the important technologies that has taken the attention of researchers. It is the interconnection of things connected with each other and to also with humans, to achieve some goals. In future IoT is expected to be effortlessly integrated into our environment and human will be solely dependent on this technology for comfort and easy life style. Any security concern of the system will directly affect human life. So security and privacy of this technology is primarily important issue to resolve. In this paper, we discuss the threats and vulnerabilities to the security of IoT devices in different domains, different layers, its deployment architecture and provides possible Block chain solution to overcome these issues. The paper also analyzes how the Block chain technology can be used to provide security and privacy in IoT. : The Internet of Things (IoT) is one of the important technologies that has taken the attention of researchers. It is the interconnection of things connected with each other and to also with humans, to achieve some goals. In future IoT is expected to be effortlessly integrated into our environment and human will be solely dependent on this technology for comfort and easy life style. Any security concern of the system will directly affect human life. So security and privacy of this technology is primarily important issue to resolve. In this paper, we discuss the threats and vulnerabilities to the security of IoT devices in different domains, different layers, its deployment architecture and provides possible Block chain solution to overcome these issues. The paper also analyzes how the Block chain technology can be used to provide security and privacy in IoT.


2022 ◽  
Vol 22 (2) ◽  
pp. 1-20
Author(s):  
Bharat S. Rawal ◽  
Poongodi M. ◽  
Gunasekaran Manogaran ◽  
Mounir Hamdi

Block chain provides an innovative solution to information storage, transaction execution, security, and trust building in an open environment. The block chain is technological progress for cyber security and cryptography, with efficiency-related cases varying in smart grids, smart contracts, over the IoT, etc. The movement to exchange data on a server has massively increased with the introduction of the Internet of Things. Hence, in this research, Splitting of proxy re-encryption method (Split-PRE) has been suggested based on the IoT to improve security and privacy in a private block chain. This study proposes a block chain-based proxy re-encryption program to resolve both the trust and scalability problems and to simplify the transactions. After encryption, the system saves the Internet of Things data in a distributed cloud. The framework offers dynamic, smart contracts between the sensor and the device user without the intervention of a trustworthy third party to exchange the captured IoT data. It uses an efficient proxy re-encryption system, which provides the owner and the person existing in the smart contract to see the data. The experimental outcomes show that the proposed approach enhances the efficiency, security, privacy, and feasibility of the system when compared to other existing methods.


2016 ◽  
Vol 4 (12) ◽  
pp. 11
Author(s):  
Pooja Shankar ◽  
Dr. Poonam Rani

Life is very precious for everyone. Life needs proper care and nurture. Human life depends on society. Only in a good society we can find a good life.  Life is simple, very little is needed to make it happy. But social evils insist on making it complicated. Social evils in society have become a serious concern in the present day world. It is gradually affecting roots of our culture and its blocking its rapid growth on the global chart. The aim of writing this research paper is to highlight Social Evils in rural and urban societies. This research paper will explore the meaning, reason, effect of social evils in the light of the analysis of two novels of Kamala Markandaya, an Indian English writer. The research paper entitled ‘The portrayal of Social Evils in Kamala Markandaya’s Nectar in a Sieve and A Handful of Rice.’ In this paper, the effort is made to study Kamala Markandaya’s Social Evils in Nectar in a Sieve and A Handful of Rice. We will find poverty, hunger, starvation, beggary, prostitution, crime, unemployment and many more social evils in both novels. Kamala Markandaya’s A Handful of Rice and Nectar in a Sieve nothing but an account of the suffering of the rural and urban people, and how the cruelty of social evil resulting in suffering, death and misfortune is more explicit in both novels. Poverty is the everyday reality of the characters in the both novels.  Poverty is not an abstract concept that one can really think about, it’s like wolf at the door that must constantly be staved off. Both novels are a jolt to awaken the society against social evils.  


Author(s):  
E.A. Kovrigin ◽  
◽  
V.A. Vasilyev ◽  

Given the trends in the modern world, as well as the rapid growth of digitalization, it is safe to say that it will inevitably affect almost all areas of human life and activities. Dmitriev’s English dictionary defines the word readiness: «It is a state where everything is done to start doing something.» Accordingly, an assessment of the company’s readiness to integrate modern digital technologies will identify opportunities, risks and threats, strengths and weaknesses of the enterprise, as well as to formulate a list of initial measures that need to be implemented. Thus, there is an urgent need to find an answer to the following questions: «How (by, what criteria and indicators) to measure readiness?», «What are the approaches to readiness assessment?» The purpose of this article is to develop a model and algorithm to assess the company’s readiness to integrate modern digital technologies. Modelling techniques were used to achieve this goal, as well as to analyze and generalize information. As a result of the research, a model for assessing the company’s readiness to integrate modern digital technologies has been developed and tested, based on the quality management model presented in the ISO 9000 series standards. A particular example shows how to use it and what it ultimately allows you to see and evaluate.


2020 ◽  
Author(s):  
Vinod Kumar Verma

BACKGROUND COVID- 19 pandemics has affected the life of every human being in this world dramatically. The daily routine of the human has been changed to an uncertain extent. Some of the people are affected by the COVID-19, and some of the people are in fear of this epidemic. This has completely changed the thorough process of the people, and now, they are looking for solutions of this pandemic at different levels of the human addressable areas. These areas include medicine, vaccination, precautions, psychology, technology-assisted solutions like information technology, etc. There is a need to think in the direction of technology compliant solutions in the era of COVID-19 pandemic. OBJECTIVE The objective of this paper is to discuss the existing views and focus on the recommendations for the enhancement in the current situation from COVID-19. METHODS Based on the literature, perceptions, challenges, and viewpoints, the following opinions are suggested to the research community for the prevention and elimination of global pandemic COVID-19. The research community irrespective of the discipline focus on the following: 1. The comprehensive thought process for the designing of the internet of things (IoT) based solutions for healthcare applications used in the prevention from COVID-19. 2. Strategies for restricting outbreak of COVID-19 with the emerging trends in Ehealthcare applications. Which should be the optimal strategy to deal with a global pandemic? 3. Explorations on the data analysis as derived from the advanced data mining and warehousing associated with IoT. Besides, cloud-based technologies can be incorporated for the global spread of healthcare-related information to serve the community of different countries in the world. 4. The most adaptable method and technology can be deployed for the development of innovative solutions for COVID-19 related people like smart, patient-centric healthcare information systems. 5. Implementation of smart solutions like wearable technology for mask and PPE along with their disposal can be considered to deal with a global epidemic like COVID-19. This will lead to the manufacturing and incorporation of wearable technologies in the healthcare sector by industries. 6. A Pervasive thought process can be standardized for dealing with global pandemic like COVID-19. In addition, research measures should be considered for the security and privacy challenges of IoT services carrying healthcare-related information. These areas and directions are diverse but, in parallel, the need for healthy bonding and correlation between the people like researchers and scientists irrespective of their discipline. The discipline may vary from medical, engineering, computing, finance, and management, etc. In addition, standard protocols and interoperability measures can be worked out for the exchange of information in the global pandemic situations. RESULTS Recommendations Discussed CONCLUSIONS In this paper, the opinions have been discussed in the multi-disciplinary areas of research like COVID-19 challenges, medicines and vaccines, precautionary measures, technology assistance, and the Internet of Things. These opinions and discussion serve as an integrated platform for researchers and scientists to think about future perspectives to deal with healthcare-related COVID-19 pandemic situation. This includes the original, significant, and visionary automation based ideas, innovations, scientific designs, and applications focusing on Inter-disciplinary technology compliant solutions like IoT, vaccinations, manufacturing, preventive measures, etc. for the improvement of efficiency and reliability of existing healthcare systems. For the future, there is dire need to strengthen the technology not only in the one area but also for the interdisciplinary areas to recover from the pandemic situation rapidly and serve the community.


2018 ◽  
Vol 3 (1) ◽  
pp. 22-32 ◽  
Author(s):  
Ernest Ezema ◽  
Azizol Abdullah ◽  
Nor Fazlida Binti Mohd

The concept of the Internet of Things (IoT) has evolved over time. The introduction of the Internet of Things and Services into the manufacturing environment has ushered in a fourth industrial revolution: Industry 4.0. It is no doubt that the world is undergoing constant transformations that somehow change the trajectory and history of humanity. We can illustrate this with the first and second industrial revolutions and the information revolution. IoT is a paradigm based on the internet that comprises many interconnected technologies like RFID (Radio Frequency Identification) and WSAN (Wireless Sensor and Actor Networks) to exchange information. The current needs for better control, monitoring and management in many areas, and the ongoing research in this field, have originated the appearance and creation of multiple systems like smart-home, smart-city and smart-grid. The IoT services can have centralized or distributed architecture. The centralized approach provides is where central entities acquire, process, and provide information while the distributed architectures, is where entities at the edge of the network exchange information and collaborate with each other in a dynamic way. To understand the two approaches, it is necessary to know its advantages and disadvantages especially in terms of security and privacy issues. This paper shows that the distributed approach has various challenges that need to be solved. But also, various interesting properties and strengths. In this paper we present the main research challenges and the existing solutions in the field of IoT security, identifying open issues, the industrial revolution and suggesting some hints for future research.


2021 ◽  
Vol 54 (2) ◽  
pp. 1-42
Author(s):  
Abdullah Qasem ◽  
Paria Shirani ◽  
Mourad Debbabi ◽  
Lingyu Wang ◽  
Bernard Lebel ◽  
...  

In the era of the internet of things (IoT), software-enabled inter-connected devices are of paramount importance. The embedded systems are very frequently used in both security and privacy-sensitive applications. However, the underlying software (a.k.a. firmware) very often suffers from a wide range of security vulnerabilities, mainly due to their outdated systems or reusing existing vulnerable libraries; which is evident by the surprising rise in the number of attacks against embedded systems. Therefore, to protect those embedded systems, detecting the presence of vulnerabilities in the large pool of embedded devices and their firmware plays a vital role. To this end, there exist several approaches to identify and trigger potential vulnerabilities within deployed embedded systems firmware. In this survey, we provide a comprehensive review of the state-of-the-art proposals, which detect vulnerabilities in embedded systems and firmware images by employing various analysis techniques, including static analysis, dynamic analysis, symbolic execution, and hybrid approaches. Furthermore, we perform both quantitative and qualitative comparisons among the surveyed approaches. Moreover, we devise taxonomies based on the applications of those approaches, the features used in the literature, and the type of the analysis. Finally, we identify the unresolved challenges and discuss possible future directions in this field of research.


Author(s):  
Martin Victor K ◽  
J. Immanuel Johnraja ◽  
Getzi Jeba Leelipushpam ◽  
J. Jebaveerasingh Jebadurai ◽  
I. Bildass Santhosam

Sign in / Sign up

Export Citation Format

Share Document