An Anti-Collision Algorithm Based on Slot Location and Tag Estimation

2013 ◽  
Vol 756-759 ◽  
pp. 3394-3398
Author(s):  
Yong Liu ◽  
Xing Zhong Xiong

RFID is one of the most important technologies in the Internet of Things (IoT), which has been widely used in all kinds of fields. However, a key problem is the tag collision when multiple tags reflect simultaneously to a reader. In traditional algorithm, slot location is always ignored. We present an anti-collision algorithm based on tag estimation and slot location in this paper. The key technique can be divided into two parts: precisely tag estimation and slot location. Simulation and test results show that the proposed anti-collision algorithm performs better than the traditional algorithm despite its simplicity.

2021 ◽  
Vol 21 (3) ◽  
pp. 1-22
Author(s):  
Celestine Iwendi ◽  
Saif Ur Rehman ◽  
Abdul Rehman Javed ◽  
Suleman Khan ◽  
Gautam Srivastava

In this digital age, human dependency on technology in various fields has been increasing tremendously. Torrential amounts of different electronic products are being manufactured daily for everyday use. With this advancement in the world of Internet technology, cybersecurity of software and hardware systems are now prerequisites for major business’ operations. Every technology on the market has multiple vulnerabilities that are exploited by hackers and cyber-criminals daily to manipulate data sometimes for malicious purposes. In any system, the Intrusion Detection System (IDS) is a fundamental component for ensuring the security of devices from digital attacks. Recognition of new developing digital threats is getting harder for existing IDS. Furthermore, advanced frameworks are required for IDS to function both efficiently and effectively. The commonly observed cyber-attacks in the business domain include minor attacks used for stealing private data. This article presents a deep learning methodology for detecting cyber-attacks on the Internet of Things using a Long Short Term Networks classifier. Our extensive experimental testing show an Accuracy of 99.09%, F1-score of 99.46%, and Recall of 99.51%, respectively. A detailed metric representing our results in tabular form was used to compare how our model was better than other state-of-the-art models in detecting cyber-attacks with proficiency.


2021 ◽  
Vol 5 (2) ◽  
pp. 61-67
Author(s):  
Indah Sulistiyowati ◽  
Moh Imam Muhyiddin

One way to prevent the transmission and spread of Covid-19 is to always keep ourselves and our environment clean. Maintaining personal and environmental hygiene can be done by using antiseptics and disinfectants. Disinfectants that are not used properly will be bad for humans. That is why so far the spraying of disinfectants for the prevention of COVID-19 has been carried out by human workers who are dressed in complete Personal Protective Equipment (PPE) using manual sprayers. This is certainly very risky to humans who do the spraying manually. The objective of this research is to minimize the risk of spraying disinfectants, by using a robotic power to spray disinfectant based on the Internet of Things (IoT) and a camera. This robot is operated by using a smartphone while to determine the environmental conditions around it is used a camera. From the test results, it obtained data that the robot works well and is quite reliable due to the wider scope limit because it uses an IoT connection to communicate with smartphones. The results of camera readings on laptops are also quite clear, although the higher the resolution on the display, the lag time required to transfer images to the laptop affects.


Author(s):  
WASIN ALKISHRI ◽  
Mahmood Al-Bahri

Biometrics In conjunction with the new development of the Internet of Things (IoT), augmented reality (AR) systems are evolving to visualize 3D virtual models of the real world into an intelligent and interactive virtual reality environment that facilitates physical identification of objects and defines their specifications efficiently. The integration between AR and IoT in a complementary way helps identify network-related items' specifications and interact with the Internet of Things more efficiently. An identity is a dedicated, publicly known attribute or set of names for an individual device. Typically, identifiers operate within a specific area or network, making it difficult to identify things globally. This paper explores the use of Augmented Reality (AR) Technology for identifying devices and displaying relevant information about the device to the user. Based on the developed model network, the developed system of identification of IoT devices was tested. Also, the traffic generated by the AR device when generating requests to the organization server was investigated. According to the test results, the system is undemanding to the main network indicators. The system-generated traffic is self-similar. The test results show that the server software can solve the problems of identifying IoT devices through interaction with augmented reality devices.


Author(s):  
Sun-ha Hong

Today, machines observe, record, and sense the world—not just for us but also often instead of us and indifferently to our meaning. The intertwined problems of technological knowledge and (our) knowledge of technology manifest in the growing industry of smart machines, the Internet of Things, and other means for self-tracking. The automation of the care of the self is buoyed by a popular fantasy of data’s intimacy, of machines that know you better than yourself. Yet as the technology becomes normalized, the hacker ethic gives way to a market-driven shift in which more and more of “my” personal truth is colonized by machines (and the people behind the machines) that I cannot question.


SinkrOn ◽  
2020 ◽  
Vol 5 (1) ◽  
pp. 129
Author(s):  
Rudi Arif Candra ◽  
Devi Satria Saputra ◽  
Dirja Nur Ilham ◽  
Herry Setiawan ◽  
Hardisal Hardisal

This study discusses the infusion detection device in a hospital room. This tool is designed to help hospital nurses to cope more quickly to avoid problems due to the infusion. Load cell sensors are used as heavy detectors that send notifications to the nurses through the telegram application that has been installed. The nurse will get a notification message sent to the telegram if the sensor has read the weight. The tool is made using a load cell sensor and NodeMCU Wi-FiESP866 which functions to send notification of the results of sensor data input to the Internet of Things (IOT) platform namely Telegram. Nurses need to be connected to the internet network to get notifications on the telegram. Test results show that the time needed to send and receive notifications on Telegram takes about 2-5 seconds. The message will be sent 3 times, first the infusion WARNING is almost exhausted (alert), second the infusion WARNING is almost exhausted (standby) and the infusion WARNING is almost exhausted (please replace). If the infusion is not replaced by the nurse, it will be warned by Buzzer. However, time can be influenced by the available internet network connectivity. However, time can be affected by the available internet network.


2016 ◽  
Vol 8 (1) ◽  
pp. 17-27 ◽  
Author(s):  
Grzegorz Sowa ◽  
Alina Marchlewska

Abstract The basic idea of is the Internet of Things is presence around us of a variety of things – such as RFID tags, sensors, actuators, mobile phones, etc. – which are able to interact with each other and cooperate with their neighbors to reach common goals. Semantic oriented IoT visions have also been proposed. The number of items involved in the future Internet is destined to become extremely high. Therefore, issues pertaining how to represent, store, interconnect, search, and organize information generated by the IoT will become very challenging. In this context, semantic technologies will play a key role. And creative approaches to visualizing data – humans are far better than computers at seeing patterns –frequently prove integral to the process of creating knowledge. From a privacy perspective, IoT is challenging because it operates in private settings, like homes, and presents an attack target that is harder to secure.


Author(s):  
Emir Husni

Problems related to fuel consumption efficiency are likely to occur in a car rental company. A system for the Internet of Things – VISCar to monitor fuel consumption on Android mobile application is proposed to solve the problem. The VISCar has four features, including driving behavior analysis, monitoring, notification, and location and route to the gas station. This system consists of three subsystems: connector, server, and user interface. Car’s engine data is scanned by OBDII and sent via Bluetooth to Raspberry Pi then passed using 3G connection to the server and being stored. The data can be accessed by users through a mobile application via MQTT and processed on server for analysis. The test results show VISCar has been successfully built and implemented to monitor fuel consumption efficiency for the car rental company.


2013 ◽  
Vol 278-280 ◽  
pp. 1818-1821
Author(s):  
Wei Liu ◽  
Jing Zhong ◽  
Jun Lin

By analyzing and extending 802.1X protocol, this paper proposes a scheme of secure terminal access on the internet of things. The scheme consists of three components: an authentication client, a switch supported 802.1X protocol and a radius authentication server. This paper proposes the work flow after explaining these components respectively. The test results show that the scheme satisfies the functional requirements of terminal security access on the internet of things.


Sensors ◽  
2019 ◽  
Vol 19 (12) ◽  
pp. 2674 ◽  
Author(s):  
Mike Yuliana ◽  
Wirawan ◽  
Suwadi

One solution to ensure secrecy in the Internet of Things (IoT) is cryptography. However, classical cryptographic systems require high computational complexity that is not appropriate for IoT devices with restricted computing resources, energy, and memory. Physical layer security that utilizes channel characteristics is an often used solution because it is simpler and more efficient than classical cryptographic systems. In this paper, we propose a signal strength exchange (SSE) system as an efficient key generation system and a synchronized quantization (SQ) method as a part of the SSE system that synchronizes data blocks in the quantization phase. The SQ method eliminates the signal pre-processing phase by performing a multi-bit conversion directly from the channel characteristics of the measurement results. Synchronization is carried out between the two authorized nodes to ensure sameness of the produced keys so it can eliminate the error-correcting phase. The test results at the IoT devices equipped with IEEE 802.11 radio show that SSE system is more efficient in terms of computing time and communication overhead than existing systems.


2014 ◽  
Vol 543-547 ◽  
pp. 3476-3481
Author(s):  
Hong Tang ◽  
Long Jia Yu

ZigBee protocol is widely used in the internet of things. In process of related equipment development, the ZigBee protocol debugging is an important part, and ZigBee protocol analyzer is a vital tool for debugging. For the existing protocol analyzer cannot deal with the wrong frame well and cannot locate a specific field quickly, this paper designs a ZigBee protocol analyzer and implement it by using the technology of quick rollback and partial repainting, the main features of this system are as follows: lower computer supports a variety of ways to connect to superior computer; it can collect data packets for 16 channels of 2.4GHz band; it can significantly identify the wrong frame; also, it can present a specific field which debugger are interested. Test results show that this system is better able to deal with the wrong frame and locate the specific field quickly.


Sign in / Sign up

Export Citation Format

Share Document