scholarly journals The Internet of Things in the Corporate Environment

2022 ◽  
pp. 132-148
Author(s):  
Kiran M. B. ◽  
Martin George Wynn

The Internet of Things (IoT) is formed by a set of physical objects with embedded sensors, connected using a network so that they can collect and exchange data. Though the concept looks simple, its deployment in industry has enormous potential to bring major business benefits and radical change. This chapter examines IoT technology and how it is being used in the corporate environment. Based on a review of existing literature and case examples, the various definitions and elements of IoT are discussed, followed by an assessment of how IoT is being used and what benefits are being delivered. Some key emergent themes are then examined – security aspects, the significance of 5G networks, and the need for an IoT strategy and project implementation guidelines. The chapter concludes by outlining possible areas for future research and suggests a step-change in the mega-infrastructure connecting IoT devices is imminent.

IoT ◽  
2020 ◽  
Vol 1 (2) ◽  
pp. 605-622
Author(s):  
David Carrascal ◽  
Elisa Rojas ◽  
Joaquin Alvarez-Horcajo ◽  
Diego Lopez-Pajares ◽  
Isaías Martínez-Yelmo

Recently, two technologies have emerged to provide advanced programmability in Software-Defined Networking (SDN) environments, namely P4 and XDP. At the same time, the Internet of Things (IoT) represents a pillar of future 6G networks, which will be also sustained by SDN. In this regard, there is a need to analyze the suitability of P4 and XDP for IoT. In this article, we aim to compare both technologies to help future research efforts in the field. For this purpose, we evaluate both technologies by implementing diverse use cases, assessing their performance and providing a quick qualitative overview. All tests and design scenarios are publicly available in GitHub to guarantee replication and serve as initial steps for researchers that want to initiate in the field. Results illustrate that currently XDP is the best option for constrained IoT devices, showing lower latency times, half the CPU usage, and reduced memory in comparison with P4. However, development of P4 programs is more straightforward and the amount of code lines is more similar regardless of the scenario. Additionally, P4 has a lot of potential in IoT if a special effort is made to improve the most common software target, BMv2.


Sensors ◽  
2020 ◽  
Vol 20 (12) ◽  
pp. 3459
Author(s):  
Yuhong Li ◽  
Xiang Su ◽  
Aaron Yi Ding ◽  
Anders Lindgren ◽  
Xiaoli Liu ◽  
...  

The Internet of Things (IoT) connects smart devices to enable various intelligent services. The deployment of IoT encounters several challenges, such as difficulties in controlling and managing IoT applications and networks, problems in programming existing IoT devices, long service provisioning time, underused resources, as well as complexity, isolation and scalability, among others. One fundamental concern is that current IoT networks lack flexibility and intelligence. A network-wide flexible control and management are missing in IoT networks. In addition, huge numbers of devices and large amounts of data are involved in IoT, but none of them have been tuned for supporting network management and control. In this paper, we argue that Software-defined Networking (SDN) together with the data generated by IoT applications can enhance the control and management of IoT in terms of flexibility and intelligence. We present a review for the evolution of SDN and IoT and analyze the benefits and challenges brought by the integration of SDN and IoT with the help of IoT data. We discuss the perspectives of knowledge-driven SDN for IoT through a new IoT architecture and illustrate how to realize Industry IoT by using the architecture. We also highlight the challenges and future research works toward realizing IoT with the knowledge-driven SDN.


2012 ◽  
Vol 198-199 ◽  
pp. 1755-1760 ◽  
Author(s):  
Guo Ping Zhou ◽  
Ya Nan Chen

Applying the Internet of Things (IOT) into ecological environmental monitoring is the goal of this paper. There are several advantages of the Internet of Things (IOT) applying in ecological environment monitoring. A hierarchical monitoring system is presented, including system architecture, hardware/software design, information flow and software implementation. In the end, using carbon dioxide gas in the atmosphere for experimental purposes, in data collection and analysis. Experiments showed that this system is capable of monitoring ecologica environment, which orientate the future research of forest ecosystem.


2022 ◽  
Vol 54 (7) ◽  
pp. 1-34
Author(s):  
Sophie Dramé-Maigné ◽  
Maryline Laurent ◽  
Laurent Castillo ◽  
Hervé Ganem

The Internet of Things is taking hold in our everyday life. Regrettably, the security of IoT devices is often being overlooked. Among the vast array of security issues plaguing the emerging IoT, we decide to focus on access control, as privacy, trust, and other security properties cannot be achieved without controlled access. This article classifies IoT access control solutions from the literature according to their architecture (e.g., centralized, hierarchical, federated, distributed) and examines the suitability of each one for access control purposes. Our analysis concludes that important properties such as auditability and revocation are missing from many proposals while hierarchical and federated architectures are neglected by the community. Finally, we provide an architecture-based taxonomy and future research directions: a focus on hybrid architectures, usability, flexibility, privacy, and revocation schemes in serverless authorization.


2018 ◽  
Author(s):  
Henry Tranter

Security is always at the forefront of developing technologies. One can seldom go a week without hearing of a new data breach or hacking attempt from various groups around the world, often taking advantage of a simple flaw in a system’s architecture. The Internet of Things (IoT) is one of these developing technologies which may be at risk of such attacks. IoT devices are becoming more and more prevalent in everyday life. From keeping track of an individual’s health, to suggesting meals from items available in an individual’s fridge, these technologies are taking a much larger role in the personal lives of their users. With this in mind, how is security being considered in the development of these technologies? Are these devices that monitor individual’s personal lives just additional vectors for potential data theft? Throughout this survey, various approaches to the development of security systems concerning IoT devices in the home will be discussed, compared, and contrasted in the hope of providing an ideal solution to the problems this technology may produce.


Author(s):  
Clinton Fernandes ◽  
Vijay Sivaraman

This article examines the implications of selected aspects of the Telecommunications (Interception and Access) Amendment (Data Retention) Act 2015, which was passed by the Australian Parliament in March 2015. It shows how the new law has strengthened protections for privacy. However, focusing on the investigatory implications, it shows how the law provides a tactical advantage to investigators who pursue whistleblowers and investigative journalists. The article exposes an apparent discrepancy in the way ‘journalist’ is defined across different pieces of legislation. It argues that although legislators’ interest has been overwhelmingly focused on communications data, the explosion of data generated by the so-called Internet-of-Things (IoT) is as important or more. It shows how the sensors in selected IoT devices lead to a loss of user control and will enable non-stop, involuntary and ubiquitous monitoring of individuals. It suggests that the law will need to be amended further once legislators and investigators’ knowledge of the potential of IoT increases. 


Author(s):  
Tanweer Alam

In next-generation computing, the role of cloud, internet and smart devices will be capacious. Nowadays we all are familiar with the word smart. This word is used a number of times in our daily life. The Internet of Things (IoT) will produce remarkable different kinds of information from different resources. It can store big data in the cloud. The fog computing acts as an interface between cloud and IoT. The extension of fog in this framework works on physical things under IoT. The IoT devices are called fog nodes, they can have accessed anywhere within the range of the network. The blockchain is a novel approach to record the transactions in a sequence securely. Developing a new blockchains based middleware framework in the architecture of the Internet of Things is one of the critical issues of wireless networking where resolving such an issue would result in constant growth in the use and popularity of IoT. The proposed research creates a framework for providing the middleware framework in the internet of smart devices network for the internet of things using blockchains technology. Our main contribution links a new study that integrates blockchains to the Internet of things and provides communication security to the internet of smart devices.


2018 ◽  
Author(s):  
Henry Tranter

Security is always at the forefront of developing technologies. One can seldom go a week without hearing of a new data breach or hacking attempt from various groups around the world, often taking advantage of a simple flaw in a system’s architecture. The Internet of Things (IoT) is one of these developing technologies which may be at risk of such attacks. IoT devices are becoming more and more prevalent in everyday life. From keeping track of an individual’s health, to suggesting meals from items available in an individual’s fridge, these technologies are taking a much larger role in the personal lives of their users. With this in mind, how is security being considered in the development of these technologies? Are these devices that monitor individual’s personal lives just additional vectors for potential data theft? Throughout this survey, various approaches to the development of security systems concerning IoT devices in the home will be discussed, compared, and contrasted in the hope of providing an ideal solution to the problems this technology may produce.


Author(s):  
Kundankumar Rameshwar Saraf ◽  
Malathi P. Jesudason

This chapter explores the encryption techniques used for the internet of things (IoT). The security algorithm used for IoT should follow many constraints of an embedded system. Hence, lightweight cryptography is an optimum security solution for IoT devices. This chapter mainly describes the need for security in IoT, the concept of lightweight cryptography, and various cryptographic algorithms along with their shortcomings given IoT. This chapter also describes the principle of operation of all the above algorithms along with their security analysis. Moreover, based on the algorithm size (i.e., the required number of gate equivalent, block size, key size, throughput, and execution speed of the algorithm), the chapter reports the comparative analysis of their performance. The chapter discusses the merits and demerits of these algorithms along with their use in the IoT system.


2019 ◽  
Vol 11 (3) ◽  
pp. 763 ◽  
Author(s):  
Frauke Behrendt

This article asks how cycling, a sustainable form of urban mobility, is discussed in the context of smart cities and the Internet of Things in European Commission (EC) policy documents, and how this compares to discussions around cars. Sustainable forms of transport, such as cycling, are a key issue for cities across the globe, including smart cities, while transport is increasingly becoming part of the Internet of Things (IoT). This article contributes to an understanding of how cars and bicycles are discussed in this context. To do so, 39 relevant EC policy documents (2014–2018) were identified and examined through keyword searches and rigorous document analysis. The results show how the vast majority of policy discussions in this area revolve around cars (including autonomous cars and smart vehicles), while cycling is hardly considered, with a strong affinity between IoT and cars. In addition, recent EC policy debates take place more around IoT than around Smart Cities, while sustainability is not considered much in the IoT context. The conclusion highlights the implications of sustainable urban modes of transport such as cycling being absent from IoT/smart debates, including lack of policy visibility and funding opportunities, underlining the significance of this research, and it also makes policy suggestions for addressing these issues and for future research.


Sign in / Sign up

Export Citation Format

Share Document