scholarly journals Fundamentals of Internet of Things (IoT): Applications, Challenges, Future Trends

Author(s):  
Prerak Gada ◽  
Kulsum Sayed

One of the jargons in Information Technology is the Internet of Things (IoT). The future is the Internet of Things, which will transform real-world objects into intelligent objects. IoT aims to introduce plug-and-play technology providing the ultimate user, ease of operation, remote access control, and configurable. This paper presents IoT technology from a bird’s eye view covering its applications in all fields, various challenges faced, and future prospects/trends. IoT applications require higher data rates, large bandwidth, increased capacity, low latency, and high throughput..

Author(s):  
Laura Belli ◽  
Simone Cirani ◽  
Luca Davoli ◽  
Gianluigi Ferrari ◽  
Lorenzo Melegari ◽  
...  

The Internet of Things (IoT) will consist of billions (50 billions by 2020) of interconnected heterogeneous devices denoted as “Smart Objects:” tiny, constrained devices which are going to be pervasively deployed in several contexts. To meet low-latency requirements, IoT applications must rely on specific architectures designed to handle the gigantic stream of data coming from Smart Objects. This paper propose a novel Cloud architecture for Big Stream applications that can efficiently handle data coming from Smart Objects through a Graph-based processing platform and deliver processed data to consumer applications with low latency. The authors reverse the traditional “Big Data” paradigm, where real-time constraints are not considered, and introduce the new “Big Stream” paradigm, which better fits IoT scenarios. The paper provides a performance evaluation of a practical open-source implementation of the proposed architecture. Other practical aspects, such as security considerations, and possible business oriented exploitation plans are presented.


Fog Computing ◽  
2018 ◽  
pp. 25-53 ◽  
Author(s):  
Laura Belli ◽  
Simone Cirani ◽  
Luca Davoli ◽  
Gianluigi Ferrari ◽  
Lorenzo Melegari ◽  
...  

The Internet of Things (IoT) will consist of billions (50 billions by 2020) of interconnected heterogeneous devices denoted as “Smart Objects:” tiny, constrained devices which are going to be pervasively deployed in several contexts. To meet low-latency requirements, IoT applications must rely on specific architectures designed to handle the gigantic stream of data coming from Smart Objects. This paper propose a novel Cloud architecture for Big Stream applications that can efficiently handle data coming from Smart Objects through a Graph-based processing platform and deliver processed data to consumer applications with low latency. The authors reverse the traditional “Big Data” paradigm, where real-time constraints are not considered, and introduce the new “Big Stream” paradigm, which better fits IoT scenarios. The paper provides a performance evaluation of a practical open-source implementation of the proposed architecture. Other practical aspects, such as security considerations, and possible business oriented exploitation plans are presented.


2021 ◽  
Vol 25 (1) ◽  
pp. 34-38
Author(s):  
Jonathan Oostvogels ◽  
Fan Yang ◽  
Sam Michiels ◽  
Wouter Joosen ◽  
Danny Hughes

Latency-sensitive applications for the Internet of Things (IoT) often require performance guarantees that contemporary wireless networks fail to offer. Application scenarios involving real-time control of industrial machinery, robotics, or delay-sensitive actuation therefore typically still rely on cables: today's wireless networks cannot deliver messages in a sufficiently small and predictable amount of time. Drop-in wireless replacements for these cabled systems would nevertheless provide great benefit by eliminating the high cost and complexity associated with running cables in harsh industrial environments [1]. The symbolsynchronous bus, introduced in this article and embodied in a platform called Zero-Wire, is a novel wireless networking paradigm that addresses this gap. Using concurrent optical transmissions, it strives to bring low-latency deterministic networking to the wireless IoT.


Connectivity ◽  
2020 ◽  
Vol 148 (6) ◽  
Author(s):  
S. A. Zhezhkun ◽  
◽  
L. B. Veksler ◽  
S. M. Brezitsʹkyy ◽  
B. O. Tarasyuk

This article focuses on the analysis of promising technologies for long-range traffic transmission for the implementation of the Internet of Things. The result of the review of technical features of technologies, their advantages and disadvantages is given. A comparative analysis was performed. An analysis is made that in the future heterogeneous structures based on the integration of many used radio technologies will play a crucial role in the implementation of fifth generation networks and systems. The Internet of Things (IoT) is heavily affecting our daily lives in many domains, ranging from tiny wearable devices to large industrial systems. Consequently, a wide variety of IoT applications have been developed and deployed using different IoT frameworks. An IoT framework is a set of guiding rules, protocols, and standards which simplify the implementation of IoT applications. The success of these applications mainly depends on the ecosystem characteristics of the IoT framework, with the emphasis on the security mechanisms employed in it, where issues related to security and privacy are pivotal. In this paper, we survey the security of the main IoT frameworks, a total of 8 frameworks are considered. For each framework, we clarify the proposed architecture, the essentials of developing third-party smart apps, the compatible hardware, and the security features. Comparing security architectures shows that the same standards used for securing communications, whereas different methodologies followed for providing other security properties.


2020 ◽  
Author(s):  
Anbiao Huang ◽  
Shuo Gao ◽  
Arokia Nathan

In Internet of Things (IoT) applications, among various authentication techniques, keystroke authentication methods based on a user’s touch behavior have received increasing attention, due to their unique benefits. In this paper, we present a technique for obtaining high user authentication accuracy by utilizing a user’s touch time and force information, which are obtained from an assembled piezoelectric touch panel. After combining artificial neural networks with the user’s touch features, an equal error rate (EER) of 1.09% is achieved, and hence advancing the development of security techniques in the field of IoT.


Author(s):  
Mahmoud Elkhodr ◽  
Seyed Shahrestani ◽  
Hon Cheung

The Internet of Things (IoT) brings connectivity to about every objects found in the physical space. It extends connectivity not only to computer and mobile devices but also to everyday objects. From connected fridges, cars and cities, the IoT creates opportunities in numerous domains. This chapter briefly surveys some IoT applications and the impact the IoT could have on societies. It shows how the various application of the IoT enhances the overall quality of life and reduces management and costs in various sectors.


Author(s):  
Aminu Bello Usman ◽  
Jairo A. Gutierrez ◽  
Abdullahi Baffa Bichi

The internet of things (IoT) is expected to influence both architecture and infrastructure of current and future smart cities vision. Thus, the requirement and effectiveness of making cities smarter demands suitable provision of secure and efficient communication networks between IoT networking devices. Trust-based routing protocols play an important role in IoT for secure information exchange and communications between IoT networking elements. Thus, this chapter presents the foundation of trust-based protocols from social science to IoT for secure smart city environments. The chapter outlines and discusses the key ideas, notions, and theories that may help the reader to understand the current status and the possible future trends of trust-based protocols in IoT networks for smart cities. The chapter also discusses the implications, requirements, and future research challenges of trust-based protocols in IoT for smart cities.


Author(s):  
Md Alimul Haque ◽  
Shameemul Haque ◽  
Kailash Kumar ◽  
Narendra Kumar Singh

The role of the internet of things (IoT) and cyberspace in a digital society is well recognized, and they have become tremendously popular due to certain features like the ability to ease the operational process of businesses and instant communication. Recent developments in the fields of wireless communication networks like 4G, 5G, and 6G with IoT applications have greatly benefited human welfare. Still, the rapid growth of various IoT applications focuses on automating different tasks and are trying to empower the inanimate physical objects to act without any human intervention. It has also contributed to unethical practices by hackers who use new tools and techniques to penetrate more complex or well-controlled environments and produce increased damage and even remain under the cover. The main objective of this chapter is to improve understanding of the challenges to secure future digital infrastructure while it is still evolving. In this context, a detailed review of the security-related issues, challenges, threats, and countermeasures in the IoT applications is presented.


Author(s):  
Hwa Lee

With the Americans with Disabilities Act (ADA), the past two decades have seen a proliferation of Assistive Technology (AT) and its enabling impact on the lives of people with disabilities in the areas of accessing information, communication, and daily living activities. Due to recent emergence of the Internet of Things (IoT), the fields of rehabilitation, healthcare, and education are challenged to incorporate the IoT applications into current AT services. While IoT applications continue to be developed and integrated into AT, they are still at a primitive stage where clear guidelines are yet to be developed and benefits are yet to be substantiated to ensure the quality of lives of people with disabilities. This chapter provides an overview of the IoT and AT integrated applications based on the building blocks of the IoT, along with recent trends and issues relevant to accessing technology for people with disabilities.


2020 ◽  
pp. 1260-1284
Author(s):  
Laura Belli ◽  
Simone Cirani ◽  
Luca Davoli ◽  
Gianluigi Ferrari ◽  
Lorenzo Melegari ◽  
...  

The Internet of Things (IoT) is expected to interconnect billions (around 50 by 2020) of heterogeneous sensor/actuator-equipped devices denoted as “Smart Objects” (SOs), characterized by constrained resources in terms of memory, processing, and communication reliability. Several IoT applications have real-time and low-latency requirements and must rely on architectures specifically designed to manage gigantic streams of information (in terms of number of data sources and transmission data rate). We refer to “Big Stream” as the paradigm which best fits the selected IoT scenario, in contrast to the traditional “Big Data” concept, which does not consider real-time constraints. Moreover, there are many security concerns related to IoT devices and to the Cloud. In this paper, we analyze security aspects in a novel Cloud architecture for Big Stream applications, which efficiently handles Big Stream data through a Graph-based platform and delivers processed data to consumers, with low latency. The authors detail each module defined in the system architecture, describing all refinements required to make the platform able to secure large data streams. An experimentation is also conducted in order to evaluate the performance of the proposed architecture when integrating security mechanisms.


Sign in / Sign up

Export Citation Format

Share Document