IoT Device Onboarding, Monitoring, and Management

Author(s):  
Selvaraj Kesavan ◽  
Senthilkumar J. ◽  
Suresh Y. ◽  
Mohanraj V.

In establishing a healthy environment for connectivity devices, it is essential to ensure that privacy and security of connectivity devices are well protected. The modern world lives on data, information, and connectivity. Various kinds of sensors and edge devices stream large volumes of data to the cloud platform for storing, processing, and deriving insights. An internet of things (IoT) system poses certain difficulties in discretely identifying, remotely configuring, and controlling the devices, and in the safe transmission of data. Mutual authentication of devices and networks is crucial to initiate secure communication. It is important to keep the data in a secure manner during transmission and in store. Remotely operated devices help to monitor, control, and manage the IoT system efficiently. This chapter presents a review of the approaches and methodologies employed for certificate provisioning, device onboarding, monitoring, managing, and configuring of IoT systems. It also examines the real time challenges and limitations in and future scope for IoT systems.

2021 ◽  
Author(s):  
B. Mohamed Arafath Rajack ◽  
N. Subramanian ◽  
N. Arun Pragadesh ◽  
R. Suvanesh ◽  
S. Vignesh

In this modern world agriculture is one of the major booming sectors around the world. In India around 60 percent of GDP comes from agriculture sector alone. Also, around the world there are many technologies showing up in the field of agriculture. In this paper proposed a technology by means of which potential pest attack in the crops can be detected and the respective pesticide is also sprayed as well. Along with these there is a range of sensor employed in the field connected to the controller that will take the real time values from the field and can be displayed in the respective screen (monitor or mobile screen) by means of technology called IOT (Internet of Things). Raspberry-pi is used as the controller to perform IoT. system is linked with an application called “cain” Which allows us to display various values of sensors in the monitor or in mobile application.


Healthcare ◽  
2021 ◽  
Vol 9 (3) ◽  
pp. 285
Author(s):  
Chuchart Pintavirooj ◽  
Tanapon Keatsamarn ◽  
Treesukon Treebupachatsakul

Telemedicine has become an increasingly important part of the modern healthcare infrastructure, especially in the present situation with the COVID-19 pandemics. Many cloud platforms have been used intensively for Telemedicine. The most popular ones include PubNub, Amazon Web Service, Google Cloud Platform and Microsoft Azure. One of the crucial challenges of telemedicine is the real-time application monitoring for the vital sign. The commercial platform is, by far, not suitable for real-time applications. The alternative is to design a web-based application exploiting Web Socket. This research paper concerns the real-time six-parameter vital-sign monitoring using a web-based application. The six vital-sign parameters are electrocardiogram, temperature, plethysmogram, percent saturation oxygen, blood pressure and heart rate. The six vital-sign parameters were encoded in a web server site and sent to a client site upon logging on. The encoded parameters were then decoded into six vital sign signals. Our proposed multi-parameter vital-sign telemedicine system using Web Socket has successfully remotely monitored the six-parameter vital signs on 4G mobile network with a latency of less than 5 milliseconds.


2021 ◽  
Vol 2021 ◽  
pp. 1-12
Author(s):  
Xiang Yu ◽  
Chun Shan ◽  
Jilong Bian ◽  
Xianfei Yang ◽  
Ying Chen ◽  
...  

With the rapid development of Internet of Things (IoT), massive sensor data are being generated by the sensors deployed everywhere at an unprecedented rate. As the number of Internet of Things devices is estimated to grow to 25 billion by 2021, when facing the explicit or implicit anomalies in the real-time sensor data collected from Internet of Things devices, it is necessary to develop an effective and efficient anomaly detection method for IoT devices. Recent advances in the edge computing have significant impacts on the solution of anomaly detection in IoT. In this study, an adaptive graph updating model is first presented, based on which a novel anomaly detection method for edge computing environment is then proposed. At the cloud center, the unknown patterns are classified by a deep leaning model, based on the classification results, the feature graphs are updated periodically, and the classification results are constantly transmitted to each edge node where a cache is employed to keep the newly emerging anomalies or normal patterns temporarily until the edge node receives a newly updated feature graph. Finally, a series of comparison experiments are conducted to demonstrate the effectiveness of the proposed anomaly detection method for edge computing. And the results show that the proposed method can detect the anomalies in the real-time sensor data efficiently and accurately. More than that, the proposed method performs well when there exist newly emerging patterns, no matter they are anomalous or normal.


2013 ◽  
Vol 846-847 ◽  
pp. 1711-1715 ◽  
Author(s):  
Wen Jie Ji ◽  
Xiao Qiong Li ◽  
Jing Yang Chen

Mountain torrent is one of major natural disasters for humans. With the development of the Internet of things, the instrumented terminals, through which the host PC could obtain the real-time water and rainfall information and could alert to a coming disaster, have been widely applied to mountain torrent warning system. In order to ensure the effectiveness of network alerting, the program in the terminals need to be updated for some specific situations, but large quantities of terminals are usually built in complex terrain and fragmented geographically, so that it is difficult and expensive to update or repair the programs. In this paper, a method of remote update, realized on the BAM-4300 hydrologic remote terminal to update the complex programs via GPRS modules, was highly reliable. Experiments show that this method is of safety and reliability, and cumbersome processes of onsite update and maintenance could be avoided.


2013 ◽  
Vol 273 ◽  
pp. 641-645 ◽  
Author(s):  
Rong Chun Sun ◽  
Yan Piao ◽  
Yu Wang ◽  
Han Wang

To help drivers to quickly find a spare parking, a parking guidance control system was proposed. The principle of ultrasonic ranging was used to detect the state of a parking space, and through the internet of things the parking detector transmits the real-time information to the control center. The control center mainly is an industrial computer and is responsible for dealing with the real-time information and sending the control command by internet of things. The guidance signs at each crossroad receive the wireless commands and execute them, by which the guidance function is performed. The internet of things was realized by ZigBee star network, in which the control center is a coordinator and other parts are routers or terminal equipments. The simulation experiment results show that the parking guidance system works well, and has the value of application and promotion to some extent.


2019 ◽  
Vol 8 (4) ◽  
pp. 5686-5691

The as most of the goods trucks in the developing nation are overloaded with goods, and this needs to be controlled via smart way. This can be achieved using the Smart Sensors and Internet of Things (IoT), as these are the emerging technologies. In these paper we propose the weight mounted sensors can dynamical give an accurate inputs about weight variation, the advantage of this system is that any extra goods or loads cannot be added while movement of the trucks, if any extra goods are been added then it can be alerted nonstop to the government agencies on the real-time or the weight on the trucks can be monitored by the central government organization. This paper will provide an integration of smart sensors and the Internet of Things (IoT) and Block Chain integration together on one platform, we propose in this paper using the block chain technology to encrypt the real-time data to the government database and this data is securely transferred or encapsulated in the block chain as block, these data cannot be modified by the cyber attacker.


Internet-of-Things (IoT) has been considered as a fundamental part of our day by day existence with billions of IoT devices gathering information remotely and can interoperate within the current Internet framework. Fog computing is nothing but cloud computing to the extreme of network security. It provides computation and storage services via CSP (Cloud Service Provider) to end devices in the Internet of Things (IoT). Fog computing allows the data storing and processing any nearby network devices or nearby cloud endpoint continuum. Using fog computing, the designer can reduce the computation architecture of the IoT devices. Unfortunitily, this new paradigm IoT-Fog faces numerous new privacy and security issues, like authentication and authorization, secure communication, information confidentiality. Despite the fact that the customary cloud-based platform can even utilize heavyweight cryptosystem to upgrade security, it can't be performed on fog devices drectly due to reseource constraints. Additionally, a huge number of smart fog devices are fiercely disseminated and situated in various zones, which expands the danger of being undermined by some pernicious gatherings. Trait Based Encryption (ABE) is an open key encryption conspire that enables clients to scramble and unscramble messages dependent on client qualities, which ensures information classification and hearty information get to control. Be that as it may, its computational expense for encryption and unscrambling stage is straightforwardly corresponding to the multifaceted nature of the arrangements utilized. The points is to assess the planning, CPU burden, and memory burden, and system estimations all through each phase of the cloud-to-things continuum amid an analysis for deciding highlights from a finger tapping exercise for Parkinson's Disease patients. It will be appeared there are confinements to the proposed testbeds when endeavoring to deal with upwards of 35 customers at the same time. These discoveries lead us to a proper conveyance of handling the leaves the Intel NUC as the most suitable fog gadget. While the Intel Edison and Raspberry Pi locate a superior balance at in the edge layer, crossing over correspondence conventions and keeping up a self-mending network topology for "thing" devices in the individual territory organize.


Internet of Things (IoT) is a connection of interconnected any things deployed in different applications. The IoT is emerging as a technique for real-time monitoring the environment like Earthquake early detection. Snow level monitoring, forest fire detection, Gas level monitoring in a Smart Kitchen. IoT based sensor network need secure communication, processing, analytics and transient storage for better monitoring of smart environments. In this article, the authors proposed a secure framework for data collection and further processing from the sensors network to the core of the network using Fog-Cloud based architecture. The paper implemented the proposed framework taking different sensors deploy in an IoT based smart kitchen environment. For experimental purpose, Raspberry Pi used as a fog node and local cloud server to monitor the environment in real-time, SQLite is used as buffer storage. The experimental setup and result show that the proposed framework is secure to monitoring in a sensor network.


Sign in / Sign up

Export Citation Format

Share Document